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", 0x1000}, {&(0x7f0000001300)="b69c3baca697f9230702acb14bca3ae98b64f4591ee3cd73f7d0a3cd4f5f7acfe4d9e75c9144fc3c9c50222fe89507aca56f1cf0fa1bbfe4ed8f594428eaf5663e29759d79f9c26cef4d91471f9cee759d51d597e67a2ecdb104540a52c3077dd253f4cdfb064ee8db2fa1178a5afcb46023b67af02fe65890496efae4cd2a87b6924576e91f80a4f284c31a4c435302d060cff34e63f8585cfca3ab2fda3c099c6646b5", 0xa4}, {&(0x7f00000013c0)="f1765f1a826c54ef44ac6f9b0a20c622b918a8b442ca693277ca9dde898e", 0x1e}, {&(0x7f0000001400)="d2bb20d52c24a3ddcc583ac563f6c60165b080b8668fb3c4f0af6ecf7e6b5e97e3fba9eb924b9dce259fa72986ef722b3f50140afac7158c11194a0e62e0c0d2aa8def00ad9a009a77d5dd842074da3914b4f03800adb2e13c5910258c9e0a5a06dd0e7cf5acfd8cceae49aa030d5bc30d698b41adf3680303e75e86c131c605856e48e96c9ae3da1e7adbe078acccd012928abca314630e0b6dae0321", 0x9d}], 0x6, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r1, 0xffffffffffffffbd, &(0x7f0000001540)="e8a526d3d0a036cd5505f20c2c071ffb88fc446b2bc218931896a0a252d4abd9111adb135207c7ee90c4d1b7bdf8dae410fdc35b1e5d09dee72d3276fb4d909d28a9388e0854defa098f0729a4e21f20b6b669091f0465376edde47ea8af6e447d06a4951eb16100cf67c359d68f75c9") 16:29:36 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r1, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0x38}}, 0x40000) preadv(r0, &(0x7f0000000480), 0x10000000000001c4, 0x2) 16:29:36 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) r1 = dup(r0) setsockopt$inet_tcp_buf(r1, 0x6, 0x2d, &(0x7f0000000140)="6b48b85b42f8021382dba666590343b30ea96db8f85ff6ba34a949057827013b51551b475ac3c2eb76d1effb34b937a76d21c57827c1dc7820709f1e880b392501c1ba731c87487e94c4d75891169098bb1d735789d47de99cd5ed6688fc40c96b08a74562f42945a21150d30ccd534f3c0ccb36f8458a5327ebe8ffaf36556102a4456607df66afa770331443462d154df8fe84dda2a6cb5649c16d1a2b5c2dbf5213e551b56373f86a2714f35706ce02f9b8102439c3851cbecf4fc6042d8fb190d7a18380a52f75b91946049d7202be0fe87ff166cd701c767cea02ab9c9b2f95312b4a55cc", 0xe7) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:36 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000040000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:36 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:36 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000060000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:36 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001c4, 0x2) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x4) 16:29:37 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:37 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:37 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0xd2a4, 0xa0000) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000180)={'broute\x00'}, &(0x7f0000000200)=0x78) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000340), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x2080, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000240)={[0x6, 0x6, 0x0, 0x0, 0x9181, 0x6, 0x8000, 0xfff, 0x3, 0x1639, 0xc0f, 0x9, 0x4c14, 0x10, 0x100, 0x9], 0x1, 0x200002}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000300), 0x2) 16:29:37 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40002200}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r1, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x27}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000200)={0xfffffffffffffffe, "fa9a7b9098a7bc609faa39a31edbfca81cef7e560fb627c7687aafdc73da1e09", 0x3, 0x1}) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000001c0)=0x7ff) preadv(r0, &(0x7f0000000480), 0x10000000000001c4, 0x2) 16:29:37 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240009b7000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xfffffffffffffffe, 0x0) write$binfmt_elf32(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/477], 0x1d1) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0x1, &(0x7f00000003c0)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x101040) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r2, 0xc0104307, &(0x7f0000000100)) r3 = dup(r0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000000)={0x5, 0x773f, 0x6}) pidfd_send_signal(r1, 0x12, &(0x7f0000000340)={0x41, 0x6, 0x3d7}, 0x0) 16:29:37 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000f0000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:37 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:37 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000080)=""/207, 0xcf}, {&(0x7f0000000000)=""/14, 0xe}, {&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/200, 0xc8}, {&(0x7f0000000480)=""/33, 0x21}, {&(0x7f00000004c0)=""/188, 0xbc}], 0x3d0, 0x2) 16:29:37 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xfffffffffffffffe, 0x7) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback, 0x3, 0x0, 0x0, 0x0, 0x2}}, 0x1a8) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x7fff, 0x8}) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x1, 0x101000) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, &(0x7f0000000080)="2b4df69a4b91826ba9fcbca56a111662a8b8002d9fcf5e767762ff25506bd87661", 0x21, 0x4, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) 16:29:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x420000) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x2, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:37 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:38 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000300110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:29:38 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/200}, {&(0x7f00000004c0)=""/63}, {&(0x7f00000001c0)=""/188}, {&(0x7f0000000700)=""/4096}, {&(0x7f00000002c0)}, {&(0x7f0000000300)=""/97}, {&(0x7f0000000380)=""/96}, {&(0x7f0000000400)=""/22}], 0x10000000000001ca, 0x2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x240400, 0x0) 16:29:38 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f0000000240)="121efdde1d75420a23ee288ae19e458d3408e54e6237685ff4a3882bef373eef329026ad3d84049fee5e272dfd653189b0f5ad1b7f9ea35ed0ac454dbaef8c0f31a76aa872cc591be45614528df04a4c00d46be636f66113b55945adde1267f9df386b19a1f7f5342ff190c3b60f23b8a9af4e076dd99fae98e7eed0c134f09bc278b042107cf83735f77f958dff64f6978d5149839245f9fda4d33001d0f297f4695b6e750cc5ebc09e4b2a02c708850bb37600daf77d28e708dfb8439a08b7bc11e8c81a8b") lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="00fb880409aabb972e0f93e42eaa598ddad6923633d5e2814298af6ecb8835338102801fb8ad1fef3c7a58066b9f2bb13b36a818924466200300ed2ab09d77feb99157975ca1d3a1427ac46e353260845851f098859635e99be1fd69b1aefb31ce9ba9f5280b7136bd8ac371bce7c24e58d5b0ffce486d040c0c1c3f47d600"/136], 0x88, 0x2) 16:29:38 executing program 2: setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x200) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x2711, @hyper}, 0x10) ioctl(0xffffffffffffffff, 0xffffffffffffffbd, &(0x7f00000000c0)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7, 0x7f, 0x2}, 0x7) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000040)={0x191, 0x200, 0xa8, 0x23}, 0x10) 16:29:38 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000004007041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:38 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:38 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000002000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:38 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:38 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:38 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) quotactl(0x0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)="a75b340814f5ec0b7e87b564b0") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001c4, 0x2) 16:29:38 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000003000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) [ 654.053791][T21159] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 16:29:38 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:39 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:39 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) [ 654.806902][T21274] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 16:29:44 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000040)=0x8000) 16:29:44 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001c4, 0x2) syz_open_pts(r0, 0x400) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/35, 0x23}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000080)=""/178, 0xb2}, {&(0x7f0000000140)=""/248, 0xf8}], 0x4, 0x0) 16:29:44 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000004000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:44 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:44 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:44 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:44 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2400000a000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) [ 660.097215][T21388] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 16:29:44 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:44 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301000, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000700)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001c4, 0x2) 16:29:44 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:44 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x200, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000400)=0xe8) sendmsg$xdp(r1, &(0x7f0000000640)={&(0x7f0000000440)={0x2c, 0x4, r2, 0x25}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000480)="9d52bf8197fb3905b18f5b63ea71d812d9a36bbaed3f99b706b088c53ee3ee281f267e6274a94e68798e108181e27be16014e81998e58a08dd724d5d9a91bc74f146cbd13cf3b42870d98cd8488465cf7bc647321e1984e452f6bda56b29e01ae551dca7bd5e281d991c3592823a09199cb2f000a61757a044a86fe0e9aabd61bf51cbf7c89b384f33cd2d28b6514dbd4fa725f65108309ff4dc8cde6df21379eb965a14ec8fddc880691a3f4d3625cac3004efbbbeafab891a90e3c88484bd6bd46c900776c483572906ae1b52fa63ca41753ecf0cae0e03f37cda0932dcab7250a25dc7748d8df830bb9b8b02daba86af830", 0xf3}, {&(0x7f0000000580)="f81d4bf353905ca43fa5696f9dabe04eb067d43595ed6eb60804", 0x1a}, {&(0x7f00000005c0)="900d", 0x2}], 0x3, 0x0, 0x0, 0x4000004}, 0x94) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:44 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2400000e000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:44 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 660.293682][T21408] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 16:29:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) 16:29:45 executing program 2: write(0xffffffffffffffff, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:45 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0xfffffffffffffffb, 0x7, 0x7f, 0x4}, 0x10) preadv(r0, &(0x7f0000000480), 0x10000000000001c4, 0x2) 16:29:45 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2400000f000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:45 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:45 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:45 executing program 2: write(0xffffffffffffffff, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:45 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='lc\x00', 0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) r3 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f00000000c0)={0x8, 0x6, 0x4, 0x2, 0x18, 0xfffffffffffffffa}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0x5, 0x0, 0x3, 0x2, 0x1, 0x5}) ioctl(r3, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:45 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000060000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:45 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00a\xdf\x86\xb3%\x98A=\xd2`\xf1\x85\x10M\xaaA\xa0\xbd\xd8\xd7\x8e8\xc2\x9c+{\x0f\b\x13\n\x1a\x9d\xea\xef\x8dD3\xc7\x9bG\x0e8\xfbv\x1b\xfa') accept$unix(r0, &(0x7f0000003c00), &(0x7f0000000500)=0x6e) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000003bc0)={0x0, 0x80000001, 0x7c6, 0x62, 0x6, 0x366f}) fcntl$setpipe(r0, 0x407, 0x3) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000003600)=0x9) preadv(r0, &(0x7f0000000480), 0x10000000000001c4, 0x2) 16:29:45 executing program 2: write(0xffffffffffffffff, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:45 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000f0000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:45 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:45 executing program 1: syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) 16:29:45 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = open(&(0x7f0000001940)='./file0\x00', 0x80004, 0x3) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000240)={r1, &(0x7f00000002c0)=""/102}) preadv(r0, &(0x7f0000001880)=[{&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000380)=""/195, 0xc3}, {&(0x7f0000000480)=""/230, 0xe6}, {&(0x7f0000000580)=""/184, 0xb8}, {&(0x7f0000000040)=""/47, 0x2f}, {&(0x7f0000001700)=""/38, 0x26}, {&(0x7f0000001740)=""/2, 0x2}, {&(0x7f0000001780)=""/102, 0x66}, {&(0x7f0000001800)=""/80, 0x50}], 0x9, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x801001}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@delsa={0x60, 0x11, 0x200, 0x70bd27, 0x25dfdbfd, {@in6=@local, 0x4d2, 0xa, 0x6f}, [@encap={0x1c, 0x4, {0x0, 0x4e21, 0x4e21, @in6=@local}}, @encap={0x1c, 0x4, {0xfffffffffffffffe, 0x4e20, 0x4e20, @in6=@empty}}]}, 0x60}, 0x1, 0x0, 0x0, 0x880}, 0x4000000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r2, &(0x7f0000000180), 0x0, 0x1fffffffe) 16:29:45 executing program 2: r0 = socket(0x0, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:46 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:46 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000030b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:46 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:46 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/193}, {&(0x7f0000000140)=""/146, 0x16e}], 0xa149f3db7599ed, 0x2) 16:29:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x2001, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x4, 0x4, 0xef}}, 0x28) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:46 executing program 2: r0 = socket(0x0, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:46 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000b7090b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:46 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:46 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x210200, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f00000000c0)={{0x5, @name="6651df2eaf612f78426b59040f08b53b34f4e4d97908c1868169d98dc3d88f00"}, 0x8, 0x3, 0x4}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x3, 0x5, 0x4, 0x80000, {0x0, 0x7530}, {0x5, 0x0, 0x5, 0x200, 0x800, 0x6, "79c16528"}, 0x200, 0x3, @userptr=0x101, 0x4}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000100)={0x3, 0x11, 0x963, 0x5, "829bc3285f52adf82cf89f614982f05c4fe4b6ffceaa30b4fbd48809507655db"}) preadv(r1, &(0x7f0000000480), 0x0, 0x2) 16:29:46 executing program 2: r0 = socket(0x0, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x2a0000) open(&(0x7f0000000040)='./file0\x00', 0x220000, 0x1) ioctl(r0, 0x200, &(0x7f0000000140)="6c9c8fdcadd25a5fd3e41a1338196a3ad5c75b87fc601c864ece00b712988160267fea21c1b65c73f5d9b5d691d9ae5108fbb986b1f1045ae33037a8dd3e96e763415d5eab9a77b3c6c7a8a1a90a3e18dc527d5988ce54ea3f2d7dbce95355cf644f80958ddc5c6e81cc2fd5c18192d0114664d9104e3c6682ab58e004b2774d2120b50db398684798ca00820d59454a3bb2cbc064cdccc57346a28c5d0e658a2669a044aaf0569ccb9ccab16564ce569fb9a356") openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) 16:29:46 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000000a0b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:47 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:47 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:47 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000140)={{0x3c, @rand_addr=0x1, 0x4e24, 0x2, 'ovf\x00', 0x4, 0x4, 0x25}, {@remote, 0x4e23, 0x1, 0x20, 0x4, 0x5}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:47 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x7, 0x400) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2010000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@delsa={0x3c, 0x11, 0x200, 0x70bd28, 0x25dfdbfe, {@in6=@ipv4={[], [], @empty}, 0x4d4, 0xa, 0x3b}, [@offload={0xc, 0x1c, {r1, 0x1}}, @output_mark={0x8, 0x1d, 0x4}]}, 0x3c}}, 0x84) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x200) r3 = accept$nfc_llcp(r2, &(0x7f0000000080), &(0x7f0000000100)=0x60) ioctl$int_in(r3, 0x5452, &(0x7f00000001c0)=0x7) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r4, &(0x7f0000000480), 0x10000000000001c4, 0x2) 16:29:47 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:47 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000000e0b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:47 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:47 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000000f0b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:47 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x66, 0x1) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000180)={0x2, 0x102001}) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000001c0)={0x10, 0xfffffffffffffff7, 0xeeb1}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') mknod(&(0x7f0000000040)='./file0\x00', 0x1f2, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/64, 0xfffffffffffffcd0}, {&(0x7f00000000c0)=""/2, 0x387}], 0x2, 0x2) 16:29:47 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x109000) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)=0x80000000) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:47 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:47 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000340)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000380)='net/netstat\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001c4, 0x2) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000040)={0xffffffff, 0x1}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001a00)="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", 0x1000}, {&(0x7f0000000080)="2c6dbc4fdb8fc275ca7ceeaa7fa777031a5bce6800c6d8d37796e7fa1e2e1724fda678311115198960056d6b1177c55149054f20c39da0c2f1a5f7620b9e91e0be596c97414681f747ec785c456cb1c3913f5a6ed9351174b478de40bfacf743152ff19c964d78b4775afb067dac981706a8b684da0e78993f87c24d8c5a2e9f83311639353a51d6888b0ebe98", 0x8d}, {&(0x7f0000000140)="5180d641e92a9ffe00cf90682710663b391801899816e07a3f352bbd33cc26f7ed8318923c109ab674d29018fd378e0cbd12479aecab991ed694bb2888bca1f97e4b4d7cbe107e2d5af43b4527dc6618d7fd84ef5e639a9c46f98c41e03c7cfb822b7cc0b1331126d8bf8f0834f20895ca0a93d69b5a669ca988ebaa465384b766defe3e7dde681e46a6081dc7", 0x8d}, {&(0x7f0000000200)="29952a852588dd423a40531f07abe5ca9055d020d5e8c1f075843b803b21e096cbb94fd196b9b20a1efb004b9df697b1b24d5639b5d4e3818571d14a", 0x3c}], 0x5, 0x9) 16:29:48 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:48 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:48 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:48 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000003f0b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:48 executing program 5: r0 = signalfd4(0xffffffffffffff9c, &(0x7f0000000180)={0x7fffffff}, 0x8, 0x800) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000002c0)) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f00000000c0)=""/183, 0xb7}], 0x1}, 0x20000000004) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x22000, 0x0) socket$packet(0x11, 0x2, 0x300) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)=0xffffffffffff2c74, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x100, 0x20, 0x4, 0x1}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000003c0)={r4, 0x7}, 0x8) preadv(r2, &(0x7f0000000480), 0x10000000000001c4, 0x2) 16:29:48 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0x5d, &(0x7f0000000280)="e97cff47109abd1f9c45db5a97a9eb06000000bdb259ae0e9aac763894bf3152756c5b420b97e45f7190e51c179edbf63e9373b6ca05a0fe615d2d1c06e661103f00945d1ca0d02562c1f0553a61f264a4947edfc79970475596f47d3bac876a3e483823d4e595dc08791e4a4a50358fe7196d8eac5bb92a6161d35333e0741d1ab5ad") 16:29:48 executing program 2: socket(0x10, 0x20001400000003, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:48 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:48 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000400b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) [ 663.715543][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 663.721397][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 663.727299][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 663.733094][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:29:48 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x6, 0x5, 0x81, 0x1f, 0xffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x880, 0x0) sendto(r1, &(0x7f0000000140)="611033fca81abe0a803f4d852a47af250ed49dc1fd6c0db2f9511c6c3446faf4e0af05feafb7b4923ed25554762aa79093d3ca07dc83b366e418a42757a54a5a931a8ebbe9eccf9e9f0ea2066af3ab5b8e140944a6610e7f2d8d03dd8779312286646d6e6bdd37a80d9ad059ecd83f85c44a8c935f02b7e01fd86e0bdeafcd4a570f41471891fb5e7ff3074d", 0x8c, 0x4, &(0x7f0000000200)=@nfc={0x27, 0x1, 0x2, 0x4}, 0x80) 16:29:48 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x7fff, 0x1007}) preadv(r0, &(0x7f0000000480), 0x10000000000001c4, 0x2) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) 16:29:48 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:49 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:49 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000600b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:49 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:49 executing program 2: socket(0x10, 0x20001400000003, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:49 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r0, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/102, 0x66}, {&(0x7f0000000140)=""/13, 0xd}, {&(0x7f0000000180)=""/133, 0x85}, {&(0x7f0000000240)=""/18, 0x12}, {&(0x7f00000002c0)=""/49, 0x31}, {&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/251, 0xfb}], 0x7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001c4, 0x2) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 16:29:49 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:49 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000009b70b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:49 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:49 executing program 2: socket(0x10, 0x20001400000003, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f054", 0x22) 16:29:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r0, &(0x7f0000000080), 0x0, 0x2) fcntl$getown(r0, 0x9) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x400, 0x4) 16:29:49 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r2, 0x4) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0x1, &(0x7f00000000c0)) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7f, 0x400000) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 16:29:49 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000f00b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:50 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:50 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:50 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, 0x0, 0x0) 16:29:50 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0x185}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') fallocate(r0, 0x0, 0x5, 0xfffffffffffff800) preadv(r0, &(0x7f0000000480), 0x10000000000001c4, 0x2) 16:29:50 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0x3ff, &(0x7f0000000000)) r1 = syz_open_dev$swradio(&(0x7f00000014c0)='/dev/swradio#\x00', 0x1, 0x2) r2 = getpgrp(0x0) getpriority(0x3, r2) getsockname$llc(r1, &(0x7f0000001500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000001540)=0x10) 16:29:50 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000000f0007041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:50 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000100007041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:50 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000640)=""/183, 0xb7}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001c4, 0x2) 16:29:50 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, 0x0, 0x0) 16:29:50 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffb9, &(0x7f0000000280)="d2d77b8fc1a9bf88bc27691b4265044087c57e79a9b784850e000000000000a27599d356d8f687fe462dc8f75a1ef11393bd8002d303daa8febace85e6a5b96e193a4677319b6510ef9ce535f06bb673971d925b8e1779a96881d11f0022d44c467a65ba7ddd3f0000005c265ae4794fe773511d18ecec22a593440e9c9ec190dd0131b861509c") r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000140)="1aebd25483d26519192bb5f1208c9793ff1f27e39d26d43d5df06a7f8a2ad92c78038c439c0aa628fb4ae17dba9fcbba772c91ee350b444edf4c9f6c3a93dd96dcd90be8142d6106f26c51d97d8f9a2e55d0934867b86dc510370837614fefd537a42eccff416e17b0790759b2360d286640de1b611867b3453b75b05dee1cfb17dcabc17b4f38745dc3889b82a45737f7b90d4b87b750e43268cd371963ea02e42d33f67fcd8badd1f66b43fd353d849dbd59ea09c64d2edd0ca46f34515d1cb3167394aa761a", 0xc7, 0xfffffffffffffffa) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) keyctl$read(0xb, r1, &(0x7f0000000340)=""/203, 0xfffffffffffffd55) 16:29:50 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 665.730738][T22252] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 16:29:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) 16:29:51 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:51 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, 0x0, 0x0) 16:29:51 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:51 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) r1 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000200)=0x98f) poll(&(0x7f0000000180)=[{r0, 0x4000}, {r0, 0x2020}, {r0, 0x1}, {r0, 0x2000}, {r0, 0x91}, {r0, 0x10}, {r0, 0x1}, {r0, 0x1}], 0x8, 0x0) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000040)={@mcast2}, &(0x7f0000000140)=0x14) 16:29:51 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000020b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) 16:29:51 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000), 0x0) 16:29:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) 16:29:51 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e22, 0x0, 'lc\x00', 0x0, 0x0, 0xffffffffffffffff}, {@loopback, 0x4e23}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x6c, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_SOCK={0x50, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffff7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x26}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x4}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x8, 0xffffffff}) 16:29:51 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000030b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:51 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:51 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000), 0x0) 16:29:52 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02007f04110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:29:52 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:52 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000040b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:52 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000), 0x0) 16:29:52 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) 16:29:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) 16:29:52 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000000a0b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:52 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:52 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xb8dd, 0x101000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000100)={0x2, [0x100, 0x9]}, &(0x7f00000001c0)=0x8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00', 0x100, 0x0, 0x1}, {@loopback, 0x0, 0x0, 0x1}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x80) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) 16:29:52 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c030002", 0x11) 16:29:52 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000000e0b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:29:52 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e0200000c110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:29:52 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:52 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c030002", 0x11) 16:29:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:29:52 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000000f0b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:53 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c030002", 0x11) 16:29:53 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000600b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:53 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:57 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2, 0x3ffb) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @mcast2, 0x1}}, 0x0, 0x1, 0x100, 0x0, 0x20}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r2, 0x5}, &(0x7f0000000200)=0x8) 16:29:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:29:57 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c030002080300010000000800", 0x1a) 16:29:57 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:57 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000004007041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:57 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:57 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c030002080300010000000800", 0x1a) 16:29:57 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:57 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b10041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:57 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x2, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0xfffffffffffffffe, 'l\x00\x00Z\x99\x06\xc4\x00', 0x0, 0x0, 0x4}, {@remote, 0x0, 0x0, 0x0, 0x5}}, 0x44) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:57 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c030002080300010000000800", 0x1a) 16:29:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:29:57 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07031dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:57 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x111100, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000140)={@dev, @loopback, 0x0}, &(0x7f0000000180)=0xc) sendmsg$xdp(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x2c, 0x6, r1, 0xb}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000200)="849a117cda42dd320f598031b1c5059060146ec6c3dbc211923d8998c56d3a1b5f6c982928e0be6ecfa619c4d9b0f046f393bf9061552182dfad87e920fec20ceac76956bc59dd5e51fd476b963f99e10d3f25c702472cdc5ee6cdaf6ac10cb00f0dcaa145661993cb002f", 0x6b}], 0x1, 0x0, 0x0, 0x4000000}, 0x40000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r2, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:57 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102", 0x1e) 16:29:57 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830220200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:58 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:29:58 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:58 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback, 0x0, 0x0, 0x10000}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:58 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102", 0x1e) 16:29:58 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830320200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:58 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:29:58 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830420200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:58 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102", 0x1e) 16:29:58 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:58 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:59 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:29:59 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830a20200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:29:59 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0", 0x20) 16:29:59 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x178d, 0x300) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x18800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0x81, 0x10, 0x1, r1}) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r2, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:29:59 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:29:59 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830e20200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:29:59 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:29:59 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0", 0x20) 16:29:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:29:59 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000001140), 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:00 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:00 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830f20200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:00 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0", 0x20) 16:30:00 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:00 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0xc25, 0x4) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:00 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f0", 0x21) 16:30:00 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:00 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2836020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:00 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x120000000000004, 0x22600) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:00 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a283002020050009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:00 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:00 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:00 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f0", 0x21) 16:30:00 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x0) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null}) r2 = dup(r0) fanotify_mark(r1, 0x9c, 0x2, r2, &(0x7f0000000040)='./file0\x00') 16:30:00 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a283002020060009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:00 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:01 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a283002020080009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:01 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x5110c0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000140)={0x56, "ab1ea3a6f1ca25760c66c5c367de602bbc8d3ad41986bc4e67440813d986a339214194d32ee54a4fdaa3c2aad1acada0e5801cb6305c4ef3c18692cf1e2c7e325192f7e07c3e20648ed9add9c9d0ea1b14dfb6638a7a"}) connect$rose(r1, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:01 executing program 2: r0 = socket(0x10, 0x20001400000003, 0x0) write(r0, &(0x7f0000000000)="220000001000070500e80000004c03000208030001000000080002004102fff0f0", 0x21) 16:30:01 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:01 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:01 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a283002020090009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:01 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace$peek(0x1, r0, &(0x7f0000000040)) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r1, 0x17ca0000, &(0x7f0000000180)="00a2a975bb2c75b9c449e6007c327561c97f977da44ed5674df49e80f6b0aa0672b732ed8f498f4602f6dd96370830a1a29e250e6b") socketpair(0xb, 0x1, 0x4, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000001c0)="0abf5819a5eb8a69268c071a7307838348c9ff7652d3b41fecbdccec42c4605cf29de2ed56326a0b67438ad01ededdb7452884a8ea4de3430214cf5234bba48e27cd2b8f2b589d08eb304ff97e0567a79c7e04214b0217d8f1ad96dda747dc3a77d4e994ceec130379d592cb0aebb10acd4cc5414461cfd3ff1aeead42b36e578c3d4081731fe8", 0x87) 16:30:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:01 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:01 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000300)=0x4fa, &(0x7f0000000340)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0x9}, 0x1) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000240)={0x2, 0x0, [], {0x0, @bt={0x7, 0x20, 0x0, 0x1, 0xdca04ec, 0x8, 0x6, 0x0, 0x8, 0x4, 0xe47, 0x9, 0x4, 0x5, 0x4}}}) pread64(r0, &(0x7f0000000140)=""/245, 0xf5, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r1, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:01 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:02 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200b0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:02 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:02 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@local}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:02 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a283002020100009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:02 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:02 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:02 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a283002020110009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:02 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001b40)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) rt_sigreturn() recvmmsg(0xffffffffffffff9c, &(0x7f0000006180)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f0000000240)=""/133, 0x85}], 0x2}, 0xf49}, {{&(0x7f0000000340)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000600)=[{&(0x7f00000003c0)=""/185, 0xb9}, {&(0x7f0000000480)=""/33, 0x21}, {&(0x7f00000004c0)=""/220, 0xdc}, {&(0x7f00000005c0)=""/56, 0x38}], 0x4, &(0x7f0000000640)=""/31, 0x1f}, 0x7}, {{&(0x7f0000000680)=@tipc, 0x80, &(0x7f0000000740)=[{&(0x7f0000000700)=""/64, 0x40}], 0x1, &(0x7f0000000780)=""/141, 0x8d}, 0x4}, {{&(0x7f0000000840)=@alg, 0x80, &(0x7f0000001e40)=[{&(0x7f00000008c0)=""/63, 0x3f}, {&(0x7f0000000900)=""/141, 0x8d}, {&(0x7f00000009c0)=""/71, 0x47}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/242, 0xf2}, {&(0x7f0000001b40)}, {&(0x7f0000001b80)=""/147, 0x93}, {&(0x7f0000001c40)=""/55, 0x37}, {&(0x7f0000001c80)=""/135, 0x87}, {&(0x7f0000001d40)=""/212, 0xd4}], 0xa, &(0x7f0000001f00)=""/90, 0x5a}, 0x7fffffff}, {{&(0x7f0000001f80)=@caif=@dbg, 0x80, &(0x7f0000002400)=[{&(0x7f0000002000)=""/104, 0x68}, {&(0x7f0000002080)=""/70, 0x46}, {&(0x7f0000002100)=""/69, 0x45}, {&(0x7f0000002180)=""/165, 0xa5}, {&(0x7f0000002240)=""/6, 0x6}, {&(0x7f0000002280)=""/216, 0xd8}, {&(0x7f0000002380)=""/99, 0x63}], 0x7, &(0x7f0000002480)=""/181, 0xb5}, 0xffffffffffffffff}, {{&(0x7f0000002540)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000004a00)=[{&(0x7f00000025c0)=""/103, 0x67}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000003640)=""/4096, 0x1000}, {&(0x7f0000004640)=""/171, 0xab}, {&(0x7f0000004700)=""/10, 0xa}, {&(0x7f0000004740)=""/137, 0x89}, {&(0x7f0000004800)=""/216, 0xd8}, {&(0x7f0000004900)=""/252, 0xfc}], 0x8, &(0x7f0000004a80)=""/194, 0xc2}, 0x3}, {{&(0x7f0000004b80)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000004fc0)=[{&(0x7f0000004c00)=""/117, 0x75}, {&(0x7f0000004c80)=""/255, 0xff}, {&(0x7f0000004d80)=""/17, 0x11}, {&(0x7f0000004dc0)=""/195, 0xc3}, {&(0x7f0000004ec0)=""/205, 0x4b0}], 0x5, &(0x7f0000005040)}}, {{0x0, 0x0, &(0x7f0000005140)=[{&(0x7f0000005080)=""/130, 0x82}], 0x1, &(0x7f0000005180)=""/4096, 0x1000}, 0xc}], 0x8, 0x2000, &(0x7f0000006380)={0x77359400}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000005040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f00000066c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000010}, 0xc, &(0x7f00000063c0)={&(0x7f0000006540)={0x174, r4, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffffc}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x32}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x44}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hwsim0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xf}}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x40}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x1a}}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000001}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000006440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000006400)={&(0x7f0000006480)=ANY=[@ANYBLOB="240000001d0000002bbd6000fbdbdfdb9ae70e67ed31717ff42b46d62502000000ab153c15d7af23002be5fed6a6eda306660ce1f2e1c8f7a05a90bc385fc854b26d15088e9a0fa7be3ad84d5b8895a339d35b7c8ec07743d3692cbed5c5010cd5a46fd67df464533a56090be820ea32cf34cf515f76e8ac131d7ed16f0fe150", @ANYRES32=r2, @ANYBLOB="0600010b08000100ac141426"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40000) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x7e, @loopback, 0x4e01, 0x0, 'lc\x00', 0x0, 0x0, 0xffffffffffffffff}, {@remote, 0x0, 0x0, 0x9, 0x0, 0x3}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) syncfs(r0) 16:30:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:02 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:02 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a283002020120009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:02 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000140)={0x1, 0x81, 0x4, 0x800, 0x0, 0xffffffff}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x20000) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000280)={0x7fffffff, 0x6, 0x101, 0x0, 0x0, [], [], [], 0x7, 0x4}) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000040)) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x0) ioctl(r1, 0xffffffffffffffbd, &(0x7f0000000200)="b66affff8111aa9771fc075df63ac6ae1e312ed83a3a771b33f7790e03bdcefca71492a7b8e036c66e3ae4161e72eedfc170f2842683c45bf6e39f141b4fce346295984a903d790b5949118599c85baba72ee076e415452d57cac6c1e61738cb744d9c42ee62b871cd77b5f21935") 16:30:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:03 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:30:03 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a283002020130009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:03 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:03 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000002c0)="7cc51f3b5586c04f445fd7e84f2738814419d5defca34dd14956ed0627931ec8d8b58e7b71018c07dd1544bed1e4b819484791781bdd9412b0486c400d52f8a6dbe8806b2ae6d853739d21cca8ce46d9ea4cf92d549abb5637cd7e6eda09548a696d7a6e740d90b71fae4f935b4c78a7f5ecee2be015ac7f5ac95c5f6f2d9cae500cab62f1a3a603936dfd8107bc700e19bb8f9405ad5b2faa4d8daa8f2e4122ff000000000000008cb1466f9ff3ca72ef72bffede07df6e5f23c48527587dc5") 16:30:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:03 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a283002020140009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:03 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x2) 16:30:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:03 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x3) 16:30:03 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0003000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:03 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x4) 16:30:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 679.282994][T23842] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:03 executing program 2: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 16:30:04 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:09 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00', 0x0, 0x2b7}, {@loopback}}, 0x44) pipe2(&(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) sendmsg$inet_sctp(r1, &(0x7f0000001600)={&(0x7f0000000040)=@in6={0xa, 0x4e21, 0x3, @remote, 0x80000001}, 0x1c, &(0x7f0000001580)=[{&(0x7f0000000140)="46ede2c64e01a2efaac66ec04790ec73ff5233b79f1ae9b79ca22e62af6573c5446eae24c6a0b614c1d5ab65eea8c986cc15cf02a99b9c52a9af84acea599365b2cd3a576866df725263daf7753e68717abefcd111e6", 0x56}, {&(0x7f00000001c0)="2f1db25dec7e828d4ef3ef71aad01b2d924c45208e5032813e89399cb8cadd8dbac1067244927c360e81efa59107ecf94e8d72a3d5b4a3e19e5ac7a890a6088cb90e28d577af46a24b184f27ae748b7e63b4aefa44a3a15ade451fd8790dc28303ed1feefea1e3e1a1bd619c8bb2862878ea956a314c0a2bc445828f1442d0f05945594a5c3923b5b60427d407f0362860164b9cc18a7558d15c6bc64cc8c491c52f2fe9b91dd6008f62c154f0bc05c53880e6f71b6143dfaa3ea427d7c7f8a0f7939756a979cfb954e0b07dbe563f3e5df172c2864ec2ec7ceff23d9b7eb3b80fa7f4bbdbaff11aebdea7b838160d543560", 0xf2}, {&(0x7f00000002c0)="18644a6ae6839ffadffa50e7768a40e27e76c37365d8ba9151cfdccb82914f7eb92651d427dd3c6bd825b6e8e983", 0x2e}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="390b88f9e58ed1b06cbc1b11e626dc7ff3404f26b5d767df149b62db59ddadfab2be59fe5df5e9e1b862a54f4e525bbc1665b2f921fdb0d7a333cdaa398a0fb63da703b7b43715cc38776305d658f3581744088725ca4fc71517c0ae3937a08dd5c954cdf7f0602780394f45a8c24539fe972ac3cff1967600b6050e73939aa7d76889c8ee13", 0x86}, {&(0x7f00000013c0)="1cf76bd203ebf11e65e0d33e549b7e0c4e74fc793df74675d25689a2f45c7a79e9fde8c5259a17b28bb7cc0eaac62ffeeb2ec9c3f4f1e0277b2822af7d0d51f9c007963d4f861485bcce3188", 0x4c}, {&(0x7f0000001440)="2d6ffed8196e3bb86b59f9ceb74bb87487b76dba0e3f29975969ab3ba4e4a8c1794239e8dc02a3e6c78223ade2544caea6c9f605e0add0f86eb29305572961febabb226c8814fce5a204cd62cfb0a009bd28cd96a7d80a7d4a10c5770d2bdf80c44c8abeded6b459d27c0a6922f5e9b08b685021954f1347aa6f39e3c0aee887934fa80439900fba63ff309e1d4c62431a0cd1687dfbfc", 0x97}, {&(0x7f0000001500)="95157b6c0f2a3e4251d116a0bc21139f8770745a9739149eb3d86c100b112eb4752822ef63871df90ab489bd568fe0bea0934e4ea9d4a2668c3fc8e75dbd66fd232694", 0x43}], 0x8, 0x0, 0x0, 0x20000000}, 0x811) syz_init_net_socket$ax25(0x3, 0x5, 0xcc) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:09 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0209000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:09 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x5) 16:30:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:09 executing program 2: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 16:30:09 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000003110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:30:10 executing program 2: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 16:30:10 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xa) 16:30:10 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0309000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x1e) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=""/238, &(0x7f0000000000)=0xee) 16:30:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:10 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xe) 16:30:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r1, &(0x7f0000000040)="5ce3e12c890a4bda6c04ecf457cc568cc843d1510ca8b522ca3d81cb18aac8715c712ca8830fe98795f9503e88bdc71381", &(0x7f0000000140)=""/46}, 0x18) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:10 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0409000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:10 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:10 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf) 16:30:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000000)={0x0, 0x4, 0xffffffffffffffc0, 0x0, 0x8, 0x3}) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:10 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0a09000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer2\x00', 0x402000, 0x0) write$uinput_user_dev(r1, &(0x7f0000000140)={'syz0\x00', {0x8, 0x7, 0x3, 0x9}, 0x4f, [0x225, 0x10000, 0x0, 0x3, 0xfffffffffffffffb, 0x0, 0x2, 0x1, 0x6, 0x1f, 0x5, 0x8, 0x80ab, 0x3, 0x5, 0x3a4a, 0x9, 0x6, 0x401, 0x9, 0x4, 0x4, 0x86bc, 0x7, 0x1000, 0x100000001, 0x5, 0x0, 0xfffffffffffff245, 0x8, 0x3f, 0xe8, 0x1, 0x7, 0x0, 0x3ff, 0x7, 0x10, 0x5, 0x3ba3, 0x8001, 0x0, 0x6cf, 0xe80, 0x8, 0x9, 0x9, 0x3, 0x6, 0xfffffffffffffbff, 0xfa2, 0xfffffffffffffffe, 0x8, 0x2f7800000000, 0x0, 0x101, 0x6, 0x7, 0x167e, 0x809, 0x0, 0x8001, 0x200, 0x1], [0xffffffff7fffffff, 0x1, 0x3, 0x101, 0x0, 0x5, 0x5, 0x0, 0xfffffffffffff000, 0x7fffffff, 0x1, 0x0, 0x20, 0x4, 0x5, 0x80, 0x4, 0x2, 0x4c, 0x3, 0x3, 0x7fffffff, 0x9, 0x4, 0x4, 0x10001, 0x1, 0x5, 0xfff, 0x8001, 0x22, 0x6, 0x0, 0x4, 0x200, 0x2, 0x1, 0x800, 0x100000001, 0x40, 0x6, 0x2, 0x1000, 0x6, 0x1, 0x1, 0x180000000, 0x7fff, 0x80, 0xfff, 0x2, 0x80, 0x6, 0x6, 0x0, 0x2, 0x101, 0x2, 0x1ff, 0x4, 0x0, 0x61, 0x5, 0x7], [0x6845, 0x20, 0x1, 0x7f, 0x7fff, 0x2, 0x0, 0x3, 0x6, 0x939, 0x4, 0xffffffffffffff45, 0x4, 0x7, 0x80, 0x4, 0x0, 0x7f, 0x8, 0x7ff, 0x7, 0xfff, 0x8, 0x5, 0x401, 0x1, 0x303, 0x67a2, 0x2, 0x2cb, 0x8, 0xfffffffffffffffb, 0x9, 0x5, 0x9, 0x7fffffff, 0x58, 0x3, 0x6, 0x6, 0x100, 0xffffffff, 0x100, 0x2, 0x8000, 0x0, 0x9, 0x5, 0x589d, 0x1, 0x158, 0xffff, 0xfffffffffffffffb, 0x4, 0xfffffffffffffffa, 0x2bd, 0x9, 0xfffffffffffffffa, 0x8, 0x1, 0x100, 0x77e, 0x1, 0x4b], [0xb76, 0x67, 0x1, 0x4, 0x1e, 0x1, 0x5, 0x2e03, 0x7ca2, 0x80, 0x80, 0xff, 0x3d5d, 0x5, 0x1, 0x1, 0x5, 0x1, 0x2, 0xc, 0x51, 0x5, 0x200, 0xc543, 0x800, 0x0, 0x4d309ae9, 0x98c0, 0x76, 0x2, 0x9, 0x6, 0x5e0b, 0x8001, 0x7, 0x34b12508, 0x5, 0x0, 0x81, 0xffffffff, 0x4b19, 0x98, 0x100, 0x8, 0x1, 0x0, 0x3f, 0x7, 0x401, 0x3, 0x4b, 0x7, 0x1, 0xd59, 0x10001, 0x786, 0x745, 0x7, 0xfffffffffffffc00, 0x8000, 0x9, 0x1, 0x8]}, 0x45c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:10 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0e09000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:10 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x60) 16:30:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:11 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0f09000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:11 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf0) 16:30:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0x80, &(0x7f0000001340)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000001340)=0x5) sendmsg$unix(r1, &(0x7f0000001300)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000012c0)=[{&(0x7f00000001c0)="c269d61f24c38a74389068b07d3885ad07ef01af5f0a18ff8a727c4e6f0496c7125d536b7b06eeadefe87d99f887bfc8c84610c79e7b3d1d1cf0cf9af06ed436702f97d4e0005a9509304f62d08404539ccf92cd6108b4e085b57c5870039e306bd8120feab93d7b9a843da5f425740af44db4880e9a763e10956967d5704b7f3f7c32a5690aa03576415a1f9b16e94d4db701b0dce45a339b57bac312e901bf6e034b592363320ab2dbf1d38e9f79f2ebcd433524f293a9d865f5cb984dff001e7494714e140798e619aee31f6272920e1b8e924b6ce7d72367c0f01cf823ed4b7605d0bccac6152af6f2371baa626c7c654d7f9aa749b78222c53a327dec4c44c5746479c618bc6b139fd3610e6f3cef8d645720ef7722c51639bf210db45283e0f02b197faccc6f91558762e08917237bd35a131d2a58a08e9b02ea1748a645d8033a043d89ad9b41d43a28ae3b4c8e693a9636e2ee0c24b855c5daffd1f5d7387448375472cf98d748a096dec8aad96f3ae224c15cf1d1383b3ce4a87790444f2befdacb526d2b0d72cd0e465091145192af1486b998250493f52ef0914b379044235ec92e20acc6e1b68c3752754da0c6b16467912cdd0219ac6a95f9951d0931e26c99241368a6a32fa670288dc7ca607e22a24047844c079518893a6e79dc869fa35116866f1a1a8594e56c05eb5c706d18f47d91532fc3f194a023ab79f66988b5b62d37625a637d55531478fd4663eca4fe51b98e51e240166954799202ff98b911172637186280ff46b14c31fca78af1e270b344799538a7a7e92bd01c864f2045f0f8abfcd369f26895fa4d33fcb57d73ad377d6aea8a9afb1afeb564895f5ac057269d8d68d2fe60acd9e4d9e7d3534f53fc421426b7a52da5db082cdab6e9126f4bda4fd133c4a47040d65416c96a17e96f5dfba7633ce27dc1c0ab2573b06e1bc2c87567637a32442e1aca5da52c13a9b4d6281f52ba2a68bd4d60b0b16ba1e22bb11ba80dd1de9fede2d192407ce3d735a9d10e78a0f2ef680afa6fc988c3d8b689de6ba2ab01d788267a8d6283fd84b1dd29de2d6e96a5db0836b594d04bff306c440251910d920e79bc2b8d7a4960059d5725fbcb545333ed91b7b201ab9637d23c3502a388fc629520954a04a1e93b8df7097e792234fdc236cd6454b8f79aa937b0b1e20a1465911e9c20f769fc731a713705e6dfb4dac0c298757b9630194b1d3e4c980938098b19bcaa4ed2e21d3cd64d8ae0b2b22fb9d4040153ff1cc38d979c89972e44c956db87eed4136b0fda7552bb4a0d4ab619d98f1b06f4c584b13236cf11782f0b2bfb425b569e7b407a1e3a42624b281c668f1295fa9ee2428c1ec9b63083d5412c8742d472c793b463ec578cb5496fe43c0dc06c0bcf5003431c9f1cbff18303b99da98450415bfebb1cd49a933c4d0f186a9dec2bb21e3078bfe06b64c00bf37ccfe819fc6278dc3286f06ce78aa3b018ab9f98269f5dc8ac4087cc6bf4e21bfd4e0fda5541f31a84d9d24d8cdef7753f1bbf389c1b275855a77c9e64e5281f5933a4e658d2494ac96c28455105b58d5cfaa652d724a05fcd7dee8c59fb57b12024ae3c73cd4fbe6a2e5e54b5ec83ca0c8ab276bb66f819359f574cd091ffe32c605ff5e3c3b2613d23cf4330805a15e6dd2aa733c40c160caddf4424e00897ea158e0d8fb42c43ef9bbcd0cb2c76e470b45b9c1badc519cee2f039a20e250cf54d6365e54e9a2457b2d56ee3d65edd6e063e2be7e2136d04351f1c302689453953d72b84f43eaeffea7fdbff3cb244aedf105af36c03237323804ecdd86a68d97510caffd566f45997119b95cd7e59532c8153bbde8e29f7da94c24b86788581aaeb1c7bfed5069abab927be5a5cec156d17989d2df87df9ef7c7d4f64661defcc7e433620cc048234d4eb3409c131550fc775325802b68fcbbeba53e3142e4a8888219b372a3db7f378bae1ad2e4543d8d6b0e8090421fba03101dcb14f18eba1d5b617a4a185113f1dd06f058fc219fac4b3addb5d5c98eed4b14d44e6eb3482fd22103038268743b3c523d8bac85a828b0aa3bfce77612ee755da033602fe2d5eaa6efeca01f01b6dd1ec543edee0fa4fb664011128bbf33b6d9d289fb4b8f5f5123f52f2ede356f16a297bdda21fc86fde1f4979efe035ba91532e48de3ff03b66f96ead7e42ae65e299f5f4d0f8eb0b0a68e117f313224d421e6b0eaae19501f41a4f93f1154f67490bba6ab5934217f7eccc01182339d77918425d168abff168d9f82bb49acd8a10b99d737e878db8a9f5545145c4629f39ac3ffc3d013e29c4d7aa34353d8037a644f6932cd9ea20afc1f800d77e3ec0e3aec3c82c9353b22bf2dc2489fbcdeebedfd4278e34aad971d23efdf62d8ddd82b69824e8f5bee11d86f72626c9c13425b603d243e6dbd4d546b18f06a376d00cc07b89dbed09bffed8f27d39a6bf829d415dce428db0a31a10661700a047683d63eb386a3f3ff0337917624f4b8b376beef83e8591e39d28d74b69fe9bc29b154a3113c7b8aed6fe924b8d698b9c0685bdc913b9939b8d5713be887b6133e707f1bf01ea1e5b51f05803066ea5e89130187c487db11fc1e9d62ebc9727356b98709500a3096a6e9bec2a7a0102a215d7b5cb860cf69a1ae4d4dd1c9fd71a1b57e924064cf49857b87f5c49aadcd6fd35062a98506a8291e4a265d32c10d142832cbd7b15d7c5079cad96ff9a9238667e3d0bb0de99abeb5059ea591e78784a3d2246f1165bb2ed10929f437f2b0279118c78c97af7bd33137589aeb6f2887b8709cb321dcb6efd700d71ef46f91c30b1b9efc1cdb3c3b9a708dd1478d9d7c15f4f9176b9e46267bbbfb1ec293fbe17d843f2ad526503f39e0ed773fa3d203c85b0d4e472088f05ad590f72f0424e87bfee05fa6d4943b979bd61c3ee9773f1e089f4cb11e6f145fb55ddc07897ce04d35c2f9de2e56e11b6f16a2cc162e1552f59b8310072a631013bc81b9fed19a095144d371f6c78498de5661a5b36bc346905fea9c6fd31001353815b5e4d3cfcb54cdef4fe38ffa2c099964f5ccd2a181ba015d479e66c76ac333657e97b781b4e3d97720f58eebdf369afae22d469b17ec09b213a9d8b14c548859ef3eb038803db96c579a3145ce364e3e407e2ca3b255189b6cab920810abdaabfeb362a2ebf7d9df70c07ec1ebe690d496e85b9ffdf75811b542066efab832d660f45c795a133761faa64bdd439f9bda81ab61d40ce7067dba31046217a9535fe3dbb7145f3888318ca4edd654c5fe9151567135a483a77e0e7770841916c3b9a69ae1910333e573658c18a0c55626dde60bf000b67be949adc22d5a18bce54b9774d994d4427973ec3e40fcf084ca4c7b662892eeac72714f0ce4277dcd972d0a6f83c42f23319b73c618a8814d2dbfdbc923443ed744ec813598aeffac49f05f5455f5b3198e9928598a7554cdaf0cd7f1ee7108be33e3a7c7ac689aa1ee4b0b1c5e940674946a817d4b770e8a26524760d075a7127e1e3b911fbccdb3fae8ec0dedf00414fead9204d4a05247090d6cfbd79ad5a7df9b2ced10e89cb5569a8dba6eb383dea2660b5000cb64896dc4bdf888f04b8e7258c7b5d52ce67d83d3cd31c2f2fcd463ae2d2604359970344ebf0c536f94ebebaa0e3394b4d72be4e300f3298c51338fb4593aa31b04a6e81b373416f7960c4b5111abb2845cc064f961e1fd7d84e5a6ce600e01573b062414ff797891efd190c0a4753e9bd2818be950904e9481cefc1955e3388bc353d9d61671aea1dcce6fe2a9e2ea686def19253948a9608a01d1230ae816b41e164f06167d69b8eb4eac9ea042bcaa99115f690bb98bf7d25d91b5ea7f5c3536e11393fe76ef9534665f30da549d5cbc46afec471b209bda7501cdf1cb9b3bb66728f0b5beaf6fba0562363bf8dc4f6395ac87a5247d8c7ebf1f0080abc8f01f27b048b7c44586af9d90b60fd4114d1ffcd35d037e21093e04ead9e308fb935324bbc451e9e57548056fc059bf3e24e1641c230221af3f676ecb6c7a7cf570ab78007bcb5c932773a95535065f99adc3377d491f93ad711acd6e46075d890623f89ae694d3b5fa549b6350ff646029009e5607e0b69dd7da78131d65824b8361c112ed4fd1d5f328294d0a80c6775192870d7070f812a1d5c241c57ec283bfbe84bd0f3139596fec734b8ee538322f60f351d67ae0123dfb64b298cce14fad3f636dcacf244c7aa444ced0b2ce96c9f2de0e1df3724b1eb865f1d306e30d1e99da068bb56a6f6f732f5192f38a6a9ae8005778451ba4628948ae9a8fc67e311d1292847993a5864ab292c6c83d046391fd62cb5516685c0b440812335b5b1fd7464f1abdd3e3c82bbc13167b02c5c9575e1d97d23fe9e99a36a2f1d52e6f807bea71892ee9bc84e74709f8498b658235f2028e263a1016f6260f5095171afe27310c3b419893f90f9d16360bdc7a6f83a7cc581857d6b2dec83990770399f99934ed1514442622c3c62211410a3722af46b413d0796e2726a7eda63533d17bf88aa244a487ffa8be211353713156e070238e2ee12eb6de558331bb8cf68f7d359518414ff382021f8c25570dfb8d223ebb5cbe6b1dc8ce49a05e14c3eb4a6a2dcca4149f921427dd1858abb5f15b6b0db30f4fd45edae96154426c7b0a4e78a127067df5bec49fa125d74edd4c7107526c7bae3e058b87d3dc787d4614624b44a581614244abacc25a74d266d0b8176687329635de7fce4d2d8a04d2063e8c20704ed35681afa3ff0c7ceefaa16dd316287216bdac663b33f6479aa4128b74b9f63aca527bc0bfa486ec1f34a6543afafa9e1fa96291c1fdea67094ef77fdd943f7c1e41fddd2eb83e88835fb5288b6da567ff36c3738d918f229c8e468ad29aafb27f707390e1c08becf3f5ced1a4b375d3b1e852090a761c771aa0fa477ad91b0a12f2a7290b69c8d4311ffd1f901b8bad0907dddb5c7a22999ad9598eeee341a89c903100f0f796aaeeeb3b4cecf12b3d151ca243f9ea1eedd76e49a109ffbab230792dceb75cbce33794bd39af7c030d815e17fccff453cea4202cf9a06ab0274ac28a702fcca2bd2b4becee552952c384d38d536402b42d8bb563ff41f16d02e800954df2edaeb07d9f4ca1268c77f893eefae428ec9d970cb568e28ae5b8acebaa5332b0fdd6cd0fc7a8762d721cb19fd0cac7cbf3aca92f7a8fc63b813a154be38d3acd7e1100d20c04c0c72bb1c74e5e2be777656b305db1cf35a465df3e86d8f3485ad49b777c27f3d8b0c49d3de8b9808a9707dfdc721b10ccf8d5bfa1154a7c5b08a78c4272e72b69cb12a573227ac959f7c3a3695b34b9f6a8c4f8a0b14d2e009f22ac43ea95107c3e35a7657915fe5837a8e53cd012bca73577937fe1ad0c5af22afd725f08b52a213d7dd9935f2ffc244a9e68602e243a6f3484545d74e01a1c5c29badcafbd4f286bb77e92689b48c9c02ac7711686470c21cd675326f7b5308c5b5fd37d00cefd04f0acd746db8eaf57301b3b87ddc5525d82f5ee52a39a855eb3dc7459266034e76156eaf125db168d6644032429f3cad3037df3d48c678a16788f0ff022972cb2b3d04b2a635b77faf825e2e84a80e1377a851dcffdcfd673d25a2b0f2f925bcce7f5ec334f3e8c511c261b9ea36882a70f5780647a303f2de3ff01287f5bb7f373cf4a87ec3e48f31e95817a66f90dfa8ec3b52057e812265c26b9006d35545e3cf7d774b0ab922e4538d2211", 0x1000}, {&(0x7f00000011c0)="df826d5fca6d028b385e932aef4516abb4b455843b616d11e921823595020033c3790dc4a783b65ed1ecf785d4db445fad18d5c3b403c944ef5b494262eac327a04540ec3798c40506b09a2bc537338376ee284056ae19f5f6a22ce1d2e1aceb7b72125f50592eb5c3a67bfe8c18", 0x6e}, {&(0x7f0000001240)="b0443f64f739ee91d680c9142d6daf51ebc29657155a7b94a818fe0128f1d1d9688518137f06a4e43f43473ef748889b5abd0e068663926bb75b53f89610d69201e6418b416ac641adf1f83f1aa880469c3904f65f", 0x55}, {&(0x7f0000000040)="e2bfdc414c0eaaf689f385b3c3623ebc7037990eeaadcf208bfb2d7b2a9bc6a03e091963b2e14bfc1dd11e107cf4d7d66a9e", 0x32}], 0x4, 0x0, 0x0, 0x80}, 0x20000000) 16:30:11 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:11 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:11 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x300) 16:30:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0x200000) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x9ffc54d20f31b614, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000080)={0x0, 0x6, 0x201a, 0x1}) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:11 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a6009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:11 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x500) 16:30:11 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00', 0x0, 0xfffffffffffffffc}, {@loopback, 0x4000000000000}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:12 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x731) 16:30:12 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 687.451682][T24432] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 16:30:12 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xaedf, &(0x7f0000000240)="0cba816372eb0ea881a91ce833978f70009596c94e9bf4936687cb5ae27614542dc7989269ce2bc7f17bd6931e70d92f4dbbe905f1e6114c61a7c8d82a7215027c7dfa3fe2d5c73b4b2b65c9c6ac6f3ac380b5d90d253ea26233aa4b48ff6d8dc172c659f34ef900"/118) 16:30:12 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0040000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:12 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xa00) 16:30:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:12 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 687.961969][T24544] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 688.006461][T24556] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 16:30:12 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) r1 = getpid() r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r3 = getuid() getresuid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) sendmsg$netlink(r0, &(0x7f0000000b40)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000b00)=[{&(0x7f0000000180)={0xf0, 0x24, 0x0, 0x70bd26, 0x25dfdbfd, "", [@typed={0x8, 0x91, @pid=r1}, @generic="7317baea4e5228ba35a8b8fdd6d95088157170c493d07d3a8691ba35315f3d960a4aab57d3810365612f536e672748e410e8b70dc1387fb896f562fdd08ef1a3ad5b7e6e86c449f60019430ba4c81f85f5a73e7d0e1dfcf20363", @generic="314b08b422282c84d208b1cdf2ba0a594ba361bc225c814271162a6e4fd3a867eedaba52d049090af4ae310c085133ca344428c6c51603a3526523d248585ada8f851266d525dfee715a", @generic="63856c9b86cf035bc8ab8418564d5193be05643f77180ca9222cf71321f0e8c35e96aac8eab15bf41c5c", @typed={0x8, 0x1, @fd=r2}]}, 0xf0}, {&(0x7f0000000280)={0x2d0, 0x38, 0x10, 0x70bd2b, 0x25dfdbfe, "", [@generic="3560df7e8a0a6a0d42304659edcb3a423f5a6e6034ae9e903397880606d764d7f5bca21a7b7362d903fb8cfe53d85c6dcb", @generic="cd4b4507f903f663418bbf862eb94743b1d706c994f87476279b013ef8bdeb84e259b3a9273223cd4389266c5f2efe1fbfac22dd7251c4afac67cdff700f64f618f51ca5968613184a693cc4d488167df721435c8240421d2b2c801f48dcf9a49bba02f6fb36a39d5934737d81b3debb4e4a41eb0ab9aabdd92dd272d19c", @generic="17d2b9fd2d97db853bc08694d447917594cc9f8ba37dd670cf9c32d7a1a6c2d084d44c2b1e5ca73c1bc96509fe6e9ebc5b73bae167065fafb8eae10a24241a6155a80f7573e03425f54c5ee5997c2167902f01bc2a7ba6154a5e376b299ee92c2579f1cd70ac63281cf330a6bc6bcb78fbf744c90d00edb906ce0bee7040ef7ee2a4db8c60db6746e929730646bde01edaa3e614cd4941152e8a60923b9d8ba4c2d14a2307102f6076ed29f82e66a381b83304313da39391d759a3a6e5c0b854f0", @typed={0x8, 0x2c, @str='{\x00'}, @typed={0x8, 0x1, @u32=0xffffffffffffffe1}, @nested={0x140, 0x4a, [@generic="48f53db04083217bf0dee21a67526f6f8516ef5598", @typed={0x14, 0x40, @str='/dev/dri/card#\x00'}, @generic="cf541a63751bb94ff45dc8acd6b102231b39dd82a75add73c7e07ac34a63e3aaf8f59bb81974f1e372aae06d2f89db46c7f996ebf8cd473c2b3f9e29458c344f87a0cef02edf78cea9dfaa0da3ac372c3a26cbcfa61ac9d49dd30d5e802854ecfd80d6ed63a32965c8bf006480d9eb84794461e15067f6bf40bd0b8f4a12209efe081d578225f7c0959ea48bd927", @typed={0x8, 0xe, @str='\x00'}, @typed={0x8, 0x1b, @ipv4=@broadcast}, @generic="fefa9bb82d84668e9b522048669bba44a96af6af4f5f49003c2cb7ca0f5a017cf04863edb4f998500d04aa8616677f0ab157e592d074c4ae2f508092452d74a6c35b8df0e98701cdd79664eaab539ebe216c40d4b19e6ea4d69c7775eedeb96e", @typed={0x14, 0x11, @str='{cgroup@wlan0\x00'}]}]}, 0x2d0}, {&(0x7f0000000640)=ANY=[@ANYBLOB="880400001500100028bd7000fcdbdf25679794123a82f6b2770416591211fbe2a07d109f7387ee5c775453e4a031a278f4c8a1cef36b5a4a97a0446c6f3f3521cf16bc8154231981ffd0a1e389666d7e488a40d5b81cc2b76e566ff9a8ed996f363bff53b12dccf5062be58aeb027073a4cda4237acca98d77a63863ec7ecbe95f5be54d0eff9d8426cd891aeecb5fe9f0310696496512739ca8feb039019ebfa0397e1fd192566f3569c2d972d6f4fab6786ee7a7919be4b1c11fdfe146240b124f53f121cab54c3da4073949b7e818eda44f8fc9681ce8f73250f9c5e47b965f26f9c6a8d6ea6c7b2975072387c3422a4108000c00", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="e5d17946ca4ba813d6ab25b74c7db9568263325d54e1593be100a1137b04e9edbdaf9aa21998de419b57e15a22bd59b763620e0bf3a71f1dcf1a4bce5d4f55333c84991794abc13a06a46f41ade7db4e6b7e13a682e984f78e763692de30df54f3a2978ad316f0ecedecd5ae3f2f8539513a5ea2d60ef6d8f34bfa5df3f2c94449be791656f269d4bfa26cdb6d3e067d970540402e3ce40a8b67f0aa88f3625fb96ced37568d6d51602c80ad1f40d4eaa3a07e2b51d74846d4e4fd15bb2444e7276754ab44e4aee8d236d4021fee3548dced8accfe31235cdbdd1eefffb2452c7f1d53e28002cc29e79e557083fa048dca63ddb3492ccef4418c611396e92059991da92c960c0200283f1616329e51ca71ebc9a1b200b4ec1f9c3a2ff48a06c0b9ae390a0890fd9ad99ab11ef692ebaa44461326abb694afce87b084cf6df1adfd804c9555b7408a1df96038f8dae8f04b332622a4e0a2b371c0fe82a18629c99465b2a428105b3e43ea189e775f5814120c24cee036b2fc598400e1704346d4f4b0f8fc70a6b109d72b890d6e84a6ef81197c5e81604b6060edf0f91bba85f0a88a2a60c4cc67c4650526a35b7ac1d5fb129cce95f71596daa1f3d67de435905b5c0531833fb13278fc3657325c12a930ad880980973bf3f8c3e3e4b8da323dd32bf29f180351c0e78a4c2d58f284727907788d274de05c2b0864f7047bf9f24112b9d828b4c427546d79d28ccb711181acf2a03a47cced0f53fb4a701a4f23996b819bc27d99126c0ea4654c79ceef08bab9b2f1cb760b938aa2f53b112ec0be53e6cf64a3342a2d29ff910633a253166d14e559bf60e25d1dca542eba97db390000000000"], 0x488}], 0x3, 0x0, 0x0, 0x4000}, 0x800) r5 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r5, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:12 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xe00) 16:30:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x0, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:30:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:12 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0003000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:12 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="27816b0e5b22240330672a88bdec9f2e4827aecc6b049f9da30ae7370161f2a2fc471859a7bd2e2e90b2c1e8ff717cd5279bd02cdc527953f32c694fa8008f77327b76c1bbaf6d894f7c7eef4ff5e5edd6427190c92324e61616475e92e349a1f7b41fa1f73964", 0x67}, {&(0x7f00000001c0)="c3da33f93a468db447cea8e2235552413916f6b7ede4d9080f7cd4ce7ed0b020fa53e3c6a25a350236ec4085176e4c738074499f8bc130df3feb2bf748cd7c9a19ef580e2374c67a995dee7fa8843efcb4ffdf48e3fb3f70b8174a592a23dcceea2370150e99d67615fc6f94c61984388d39ae3c24f63a1e6edf0bc573356b7fc77f83c38b096a66ca9847d13d4141d2961cfee6e693cf9bad2536804fd2153125ce0d160f79c85f7a45f64c6d5729530c0a2a715d602dcbc935f64a9805504732f8923fa4dcbb9abe78b1bcd03a535f92f89afbcb01d5080b1372b146294cef9c0f01b2d8baaf045200cf2a341478d095fa", 0xf2}, {&(0x7f00000002c0)="314e372f6289e4ddaad7bea171bf56afb1655db9454452b326847b0460a8c9f150dd68553ba526c758e6ad9e3f487af69f17510545d3072a917ae0cd835c635edd4e2ec619d0f95f49ab209e721462a3dd81186a8b19", 0x56}, {&(0x7f0000000340)="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", 0x1000}], 0x4, &(0x7f0000001340)=[@assoc={0x18, 0x117, 0x4, 0x7e91}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x48, 0x40000}, 0x20000800) 16:30:12 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf00) [ 688.201327][T24578] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 688.236280][T24582] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:13 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e0200004e110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:30:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 16:30:13 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0010000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:13 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x3107) 16:30:13 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000140)='/dev/dri/card#\x00', 0xfffffffffffffff8) r2 = request_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='em0eth1vboxnet0[cgroup\x00', 0xfffffffffffffffa) keyctl$instantiate(0xc, r1, &(0x7f0000000180)=ANY=[@ANYBLOB='new default trustedsteduser((trusted,trusted 00000000000000042047\x00\x00\x00\x00\x00'], 0x46, r2) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:13 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009030000001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 16:30:13 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00', 0xfffffffffffffffe}, {@loopback}}, 0x44) creat(&(0x7f0000000040)='./file0\x00', 0x18) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @multicast2, 0x0, 0x0, 'nq\x00\x00\x00\x00\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 16:30:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 689.082111][T24736] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:14 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x4000) 16:30:14 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009040000001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000140)="de5328ad50810cdcfca00efd91f53eb7b2e0a2ad8735d96214c8b8aa277a350b8b303524d9a634ced65ccc3185a9f73821ddced9de5c0e38f5ed306e4608a95de7d077e723987fec0199d382f9ac70d5079676466ddd57be9b28511547f0d26b3724a57cc12f054b2f0749a1b5c81bf02a90021c1bd40814e251a0ac319e61324782c55e7abd9af921fcf252f443c8d84c7c2fb5979d17f2716d35e8932ab45878a10378", 0xa4) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:14 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xa42, 0x0) r3 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000180)={{0x4, 0x1, 0x100, 0x100000000, 'syz1\x00', 0x9}, 0x1, 0x8, 0x4, r3, 0x4, 0x4, 'syz1\x00', &(0x7f0000000040)=['-\x00', '\x00', 'TIPCv2\x00', 'TIPCv2\x00'], 0x11, [], [0x10, 0x6, 0x6, 0x100]}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x51cb000000}]}]}, 0x20}}, 0x0) 16:30:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000140)) 16:30:14 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x6000) [ 689.780155][T24860] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 689.807476][T24864] cgroup: fork rejected by pids controller in /syz5 16:30:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:14 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009020100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000000)) [ 689.961240][T24883] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:14 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf000) 16:30:14 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009030100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x82) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x8}, 0x18) 16:30:14 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x34000) [ 690.214934][T24902] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 690.344277][ T26] audit: type=1800 audit(1556728214.973:379): pid=24887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="sda1" ino=16772 res=0 16:30:15 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) 16:30:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:15 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009040100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:15 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x400300) 16:30:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) [ 690.722627][T25025] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:15 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf0ffff) 16:30:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x801, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:15 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x1000000) 16:30:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:15 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090a0100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'veth1_to_hsr\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) [ 691.002240][T25048] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:16 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b04660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:30:16 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090e0100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:16 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x2000000) 16:30:16 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x8800) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000140)=0x4) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:16 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090f0100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) [ 691.657183][T25168] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:16 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x3000000) 16:30:16 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x200000, 0x0) connect$llc(r0, &(0x7f0000000140)={0x1a, 0x10f, 0x8, 0x100000001, 0x3cc0, 0x7fffffff, @random="2e70ed9552fd"}, 0x10) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f00000001c0)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x4, @loopback, 0x4e21, 0x0, '\x00', 0x0, 0x80000}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x4e21}}, 0x44) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl(r1, 0xffffffffffffffbd, &(0x7f00000000c0)) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000180)={0x101, 0x400}) [ 691.751460][T25180] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:16 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009600100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:17 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:17 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x4000000) 16:30:17 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e21, @rand_addr=0x3}, @in6={0xa, 0x4e24, 0x5, @loopback, 0x5}], 0x3c) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000140)=""/247) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) getsockopt$llc_int(r1, 0x10c, 0x9, &(0x7f0000000240), &(0x7f0000000280)=0x4) 16:30:17 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000300001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) sendfile(r1, r2, 0x0, 0x2008000fffffffd) [ 692.539431][T25314] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 16:30:17 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="73797a31c0d0a9dd3ca6893637144b0c25a3344634f6fdf337feaf5529a1913e33d5cf93cd51c4ae4c9db31e8add5211443e5ad9408b85920da59a66358eba4f346c034898abf1b4f9b466285104e4759c146d86088494ee57f2af7b6cb509aa76b026c027286686ce79777d819edb6570aa759d59d8a8b3a97dfed7015f71a6c18a3191eee88bebf3e257877b0698e0d8ef3f3ad3d23963648bf32ab5cc17fe9c6c52fd7d30dd559f46787aa8687469eb138aa5f67a9f548fec85901ea971a0"], 0xc0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:17 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x5000000) 16:30:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:17 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009004000001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:17 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'lc\x00'}}, 0x24) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:17 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xa000000) 16:30:18 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:18 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000200001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:18 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x44401) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:18 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xe000000) [ 693.458255][T25458] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 16:30:18 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x3f, 0x20000) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000640)={'nat\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000180)=[{}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2100, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) getsockname(r0, &(0x7f0000000400)=@can={0x1d, 0x0}, &(0x7f0000000480)=0x80) sendmsg$nl_route(r2, &(0x7f0000000600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=@ipv4_newroute={0xfc, 0x18, 0x2, 0x70bd28, 0x25dfdbfc, {0x2, 0x20, 0x34, 0x5, 0x0, 0x3, 0xfd, 0x3, 0x2600}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x4}, @RTA_OIF={0x8, 0x4, r3}, @RTA_IIF={0x8, 0x1, r4}, @RTA_METRICS={0xb0, 0x8, "1042253f8331b886a1e8d64ebd9e85ef01d5ecd4726eafee7671a2a67b9d4da566edad935281574325f1002decf6fa22a6b8c91c983a5bad214f795ec50f2548d83fb1eb67982be89af101c0bdca0f42cae05f2266620f1d5b3fe07bc5782561a0a5e171457c3b646914e44926e8c63525a365d566d58e18eec1c498f776346e555146674c55da6fc938fffec3becefd54472112f24caec1d93ea8f4522370d4577aa61841c226e07d"}, @RTA_PRIORITY={0x8, 0x6, 0x100}, @RTA_IIF={0x8, 0x1, r5}, @RTA_FLOW={0x8, 0xb, 0x3f}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:18 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf000000) 16:30:18 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000300001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:18 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x31070000) [ 693.650491][T25475] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 16:30:18 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:18 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140)={{0x7e, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) splice(r0, &(0x7f00000001c0), r0, &(0x7f0000000200), 0x8, 0x1) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x4, 0x50000) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x848b, 0x7) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40140, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@timestamp], 0x1) 16:30:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:18 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000800001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:18 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x40000000) 16:30:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:19 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x60000000) 16:30:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:19 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x0, 'lc\x00', 0x3}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:19 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000003001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:19 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x9effffff) 16:30:19 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:19 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000102001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:19 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x6, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x3, 0x2) r2 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)="ae49a9a5ee83fa9285f52d8dd412fbae4129546bae8ae4da22fbae8b037f6c6a352c35eeeaf6326305658b3672770281d286b62f4a06645b819454fd8b230087072981d545438c05831ce11bdabf226c908a57b2b9672ca24074e9c0bcfd044973c397aab4815143a0a57c8c2e1a43b78a6e94a77c5e17", 0x77, 0xfffffffffffffffc) keyctl$update(0x2, r2, 0x0, 0x0) getsockname$netrom(r1, &(0x7f0000000140)={{0x3, @netrom}, [@bcast, @bcast, @rose, @rose, @netrom, @rose, @default, @null]}, &(0x7f0000000040)=0x48) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@remote, @in6=@mcast2}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) openat$cgroup_procs(r1, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(0xffffffffffffffff, 0x8007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffd) 16:30:19 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf0ffffff) 16:30:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:19 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xfffff000) 16:30:19 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000103001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000040)={0x80000001, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r1, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(0xffffffffffffffff, 0x8007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffd) 16:30:20 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xffffff7f) 16:30:20 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000104001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:20 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:20 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x84001, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000040), &(0x7f0000000140)=0x4) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xefde, &(0x7f0000000200)="82edf699570015a7677bcf984d199d40c27ee2fa09533983cdbd2b6f5b1de316267537d0257f4d5dc4098941e4cafa69f6da3573da1432906c71cb6b89ba9db21616b87ce240b45ac25b67aeef6f1475dcdb3bd846b8b41e5f24d2fe420a463c4ffdf9462c1522e0d5cef68fc9ca165f705c8e932f91fe5b0d2d3a910b59c2787ce59a48748bc20968") fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) 16:30:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(0xffffffffffffffff, 0x8007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffd) 16:30:20 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xffffff9e) 16:30:20 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a000900010a001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(0xffffffffffffffff, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r0, 0x8007d) sendfile(0xffffffffffffffff, r0, 0x0, 0x2008000fffffffd) 16:30:20 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) connect(r1, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1}, 0x0, 0x4, 0x1, 0x2}}, 0x80) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:20 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a000900010e001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:20 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xfffffff0) 16:30:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(0xffffffffffffffff, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r0, 0x8007d) sendfile(0xffffffffffffffff, r0, 0x0, 0x2008000fffffffd) 16:30:21 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x40030000000000) 16:30:21 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:21 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a000900010f001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) socketpair(0x15, 0x800, 0xa0, &(0x7f0000000000)={0xffffffffffffffff}) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @loopback}, 0x10) 16:30:21 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf0ffffffffffff) 16:30:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(0xffffffffffffffff, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r0, 0x8007d) sendfile(0xffffffffffffffff, r0, 0x0, 0x2008000fffffffd) 16:30:21 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x100000000000000) 16:30:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x2, 0x10002) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:21 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000160001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r0, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r1, 0x8007d) sendfile(r0, r1, 0x0, 0x2008000fffffffd) 16:30:21 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x200000000000000) 16:30:21 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090001f0001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:22 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r0, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r1, 0x8007d) sendfile(r0, r1, 0x0, 0x2008000fffffffd) 16:30:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:22 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x300000000000000) 16:30:22 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100031d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:22 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090001b7091d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:22 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x400000000000000) 16:30:22 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x500000000000000) 16:30:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r0, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r1, 0x8007d) sendfile(r0, r1, 0x0, 0x2008000fffffffd) 16:30:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:23 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:23 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090001000a1d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:23 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xa00000000000000) 16:30:23 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:23 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x7ffe, 0x8001) fallocate(r0, 0x3, 0x0, 0xfff3) 16:30:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:23 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:23 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090001000e1d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:23 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xe00000000000000) 16:30:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:23 executing program 1: socket(0x0, 0xa, 0x401) r0 = socket$inet(0x2, 0x1, 0xe5de) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000280), 0x63a7) gettid() getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r2 = socket(0xa, 0x3, 0x9) setsockopt$packet_buf(r2, 0x107, 0xc, &(0x7f0000002540)="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"/311, 0x137) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000640), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00', 0x40}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000080)={'bridge0\x00', 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@remote, @loopback, @local, 0x4, 0x78, 0x0, 0x100, 0x1}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) 16:30:23 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090001000f1d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) [ 699.110512][T26330] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.117867][T26330] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.246007][T26335] device bridge_slave_1 left promiscuous mode [ 699.255927][T26335] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.359772][T26335] device bridge_slave_0 left promiscuous mode [ 699.369975][T26335] bridge0: port 1(bridge_slave_0) entered disabled state 16:30:24 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:24 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:24 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf00000000000000) 16:30:24 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090001003f1d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:24 executing program 1: socket(0x0, 0xa, 0x401) r0 = socket$inet(0x2, 0x1, 0xe5de) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000280), 0x63a7) gettid() getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r2 = socket(0xa, 0x3, 0x9) setsockopt$packet_buf(r2, 0x107, 0xc, &(0x7f0000002540)="86025c556b25047c6a92973c3ca3fe208d8af43add44de7bfff8ec54a57168a4dbf6ae69469a77f1080000007f70e4d58bf9fc47f7d3d8bb617c4c8b0ddadcfb015e00d9574e9a43c7be25d2a509a811eab06ab1bb0626958c9f18c3093e1226e96f950f0b7fea1b15bbb492b0f32d01a0abec83fe29c97475004b861e796276cd9e7d580332dce8c0c79f0ab1e611c25da437c578fdb109ddcccb3acc6df85c00bf2bd51c203ba760813264af323780be28b0f4df2efedef1ecb0b7aa44e8881a8d8b657fa1b4b56ca8b88f4242edb0920dd1702e5d46d231b6e32036bd1060bd386f98dc3ec8e7e9136b4941178ab5759c7982316721d7542f276cbc4fa88ed2cbd64956b8e16614cb784d05094c14ec5120d025d7587e5b783b7fc42d91bbb6f149dde1d2614aa200"/311, 0x137) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000640), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00', 0x40}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000080)={'bridge0\x00', 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@remote, @loopback, @local, 0x4, 0x78, 0x0, 0x100, 0x1}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) 16:30:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:24 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:24 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100401d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:24 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x3107000000000000) 16:30:24 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100601d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:25 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:25 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x4000000000000000) 16:30:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:25 executing program 1: socket(0x0, 0xa, 0x401) r0 = socket$inet(0x2, 0x1, 0xe5de) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000280), 0x63a7) gettid() getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r2 = socket(0xa, 0x3, 0x9) setsockopt$packet_buf(r2, 0x107, 0xc, &(0x7f0000002540)="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"/311, 0x137) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000640), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00', 0x40}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000080)={'bridge0\x00', 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@remote, @loopback, @local, 0x4, 0x78, 0x0, 0x100, 0x1}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) 16:30:25 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000109b71d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:25 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100f01d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:25 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x6000000000000000) 16:30:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:25 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100021d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:25 executing program 1: socket(0x0, 0xa, 0x401) r0 = socket$inet(0x2, 0x1, 0xe5de) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000280), 0x63a7) gettid() getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r2 = socket(0xa, 0x3, 0x9) setsockopt$packet_buf(r2, 0x107, 0xc, &(0x7f0000002540)="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"/311, 0x137) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000640), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00', 0x40}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000080)={'bridge0\x00', 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@remote, @loopback, @local, 0x4, 0x78, 0x0, 0x100, 0x1}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) 16:30:26 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:26 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x9effffff00000000) 16:30:26 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100031d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:26 executing program 1: socket(0x0, 0xa, 0x401) r0 = socket$inet(0x2, 0x1, 0xe5de) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000280), 0x63a7) gettid() getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r2 = socket(0xa, 0x3, 0x9) setsockopt$packet_buf(r2, 0x107, 0xc, &(0x7f0000002540)="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"/311, 0x137) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000640), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00', 0x40}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000080)={'bridge0\x00', 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@remote, @loopback, @local, 0x4, 0x78, 0x0, 0x100, 0x1}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) 16:30:26 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf0ffffff00000000) 16:30:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:26 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100041d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:26 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xffffff7f00000000) 16:30:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:26 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x2005}, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') 16:30:27 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:27 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090001000a1d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:27 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xfffffffffffff000) 16:30:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 16:30:27 executing program 1: socket(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r0 = gettid() pipe(0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) r2 = dup2(r1, r1) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x9a) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1a) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) socket(0x0, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) tkill(r0, 0x1000000000016) 16:30:27 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090001000e1d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 16:30:27 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = dup(r0) write$P9_RREAD(r1, &(0x7f00000001c0)={0xd7, 0x75, 0x1, {0xcc, "10ae2f1f86b9e4a1aeb146cde9da9df5509794925666fcb6bfc558024e4462c1e4cb52d93062db64571145457a9b8925de701030e377907929ed8987c1de4bfae723c0ce66f42db7b43591fb1c992585e973c2a2639df0853da37152f94ca468dbaa8525edd4a2395e9dff572a2eec38460dfb0df39e9fead5e3ca09cbd38aac00f3aa6b647888edcaf514c64b8722b57057b766a11ee22df84a5414f6bec0848bf61cc18579170f3bf77891ab364dad75726fa848f16830528498e4cfcaee89921cd733b4b5e461d8259149"}}, 0xd7) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x7, 0x4) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 16:30:27 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) r1 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0x800000000000, 0x0) 16:30:27 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:27 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), r2, 0x3b87a218b03f70c1}}, 0x18) 16:30:27 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a00090001000f1d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 16:30:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockname$netlink(r0, 0x0, &(0x7f00000001c0)) 16:30:28 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:28 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100601d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:28 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x410000, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000040)={0x3895, 0x3, 0x7, 0x4, 0x7fffffff, 0x1000}) 16:30:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:28 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d8568021baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:28 executing program 0: r0 = socket$inet(0x10, 0x800000006, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) [ 703.602457][T27230] device nr0 entered promiscuous mode [ 703.879171][T27236] device nr0 entered promiscuous mode 16:30:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:28 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x4000, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x22, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdoo=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c0165727369f78d3d397032303030f9c15d2c63616368653d6d6d61702c667363616368652c76657273696f6e3d39be1e1ad983b42b90ba35a4d5753270d0025be04db63c618245169c2dbee9d8d126fb5effccac3e2533dccf0edae76d8b2126acc87fcb42846179e3f5265989e4bb61c1519348efad8a2b85c912ab4a74ece07fa02d60915af651a41732a931b80063c2607f580311f2780582231a5f52a291e650ae8045cefc1ec4db", @ANYRESDEC=r2, @ANYBLOB=',uid<', @ANYRESDEC=r3, @ANYBLOB=',\x00']) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x7fc) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x20000, 0x0) sendto$llc(r1, &(0x7f0000000200)="c46c7c1fa5efe8e2da0eb1035091547961c7c7a81bc1ea807309f93184ea13f306f53eac62396b3f9a7c66c613cd47a2aa9409287d34d16f2a80ef11dbf21afad5ab1f84c31d807a7e5d8672c9c16a4c3b3524756d81f3bd50bf21fbb6f29316d5807ba2965989058ab9cb33f2c363fc0f707f3a759fba1ba25cf3f6833f4674cb8895a8a591d5caaf80fd88d7616342d291b481909ffd596d18af2e8263a705fc11e963f5e2c4dd3ae9dc4bfc84aeeb095791cce8e164e6f3e26df3cb3cab8de6f705d4858ae92677818e1a5aa6f5919241796c217a", 0xd6, 0x10, 0x0, 0x0) ioctl$BLKRAGET(r4, 0x1263, &(0x7f00000001c0)) 16:30:28 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d8568041baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:28 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(0xffffffffffffffff, 0x8007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffd) 16:30:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(0xffffffffffffffff, 0x8007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffd) 16:30:29 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x7d, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 'fo\x00', 0x20, 0x9, 0x80}, 0x2c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:29 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d8568061baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:29 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe, 0x10004000}, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:29 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d8568071baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:29 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000000)=0x101, 0xfffffffffffffe94) 16:30:29 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:29 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d8568081baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:29 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}]}, 0x0) 16:30:29 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680a1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:29 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'ipddp0\x00', 0x1000}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000200)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0xa, 0x2, 0x2, 0x3}) getsockopt$inet_dccp_buf(r0, 0x21, 0xd, &(0x7f0000000300)=""/102, &(0x7f0000000380)=0x66) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000240)={'HL\x00'}, &(0x7f0000000280)=0x1e) 16:30:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:30 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d8568101baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:30 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:30 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d8568251baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:30 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0xc4001, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:30 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20300ff7f", 0x24}], 0x1}, 0x0) 16:30:30 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x72, "66fe926f84d3647b2ce3757d329bee8a37c42ed550a86ec4f3a502d33a34f9b89bc144cf5de6dcd8085158d173f03939e28699ae60d783464cc66043c910979b06186ac40f9e65852b9b49171ba6b2af3499c32a75973eef9638d70a9219a27039293ddb309154693b711c2edaca3afee78d"}, &(0x7f0000000100)=0x7a) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) [ 706.264921][T27765] __nla_validate_parse: 1 callbacks suppressed [ 706.264934][T27765] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:30 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20402ff7f", 0x24}], 0x1}, 0x0) [ 706.422596][T27780] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:31 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:31 executing program 0: r0 = socket$inet(0x10, 0x800000000, 0xc) accept4(r0, 0x0, &(0x7f0000000000), 0x80800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000080)={{0x1, 0x800}, 0x1, 0x101, 0x80000001, {0x81, 0x100000000}, 0xcc7e, 0x2}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x0, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x8}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:30:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r0, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r1, 0x8007d) sendfile(r0, r1, 0x0, 0x2008000fffffffd) 16:30:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:31 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20403ff7f", 0x24}], 0x1}, 0x0) 16:30:31 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:31 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 707.002213][T27893] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:31 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20404ff7f", 0x24}], 0x1}, 0x0) 16:30:31 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x16df, 0x10000) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000040)={0x6, 0x5, 0x5}) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:31 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r0, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r1, 0x8007d) sendfile(r0, r1, 0x0, 0x2008000fffffffd) [ 707.194237][T27918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:32 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:32 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff, 0x0, 0xfb, 0x0, 0x40}}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000140)={@rand_addr="cb483b348af28ef03029a64aae82f9c7", 0x9, 0x3, 0x0, 0x1, 0x100000001, 0x8000}, 0x20) getsockopt$inet6_int(r1, 0x29, 0x4e, 0xfffffffffffffffe, &(0x7f0000000100)) 16:30:32 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba2040aff7f", 0x24}], 0x1}, 0x0) 16:30:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r0, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r1, 0x8007d) sendfile(r0, r1, 0x0, 0x2008000fffffffd) 16:30:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 707.940350][T28052] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:32 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f0eca7d37062ee3a384feb24ba417da9c0acd2aba46392b9db38827ed6520e8d2b11b2e5a3a9e2f541fa1f44d2261ac54bb88efc2a0834a35e897a7486ef144cb9f7ff4dbe47823856b55ce5f8a57734254736f6740ed44b23a31114984f36baf17df40f471", 0xfffffffffffffcb4}], 0x1, 0x0, 0xffffffffffffff5e}, 0x0) 16:30:32 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba2040eff7f", 0x24}], 0x1}, 0x0) 16:30:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(0x0, 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:32 executing program 0: r0 = socket$inet(0x10, 0x0, 0x2) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xac) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000040)={0xc, 0x6000}) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) [ 708.159638][T28069] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:33 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(0x0, 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:33 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba2040fff7f", 0x24}], 0x1}, 0x0) 16:30:33 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x501100, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24}, @in={0x2, 0x4e20, @empty}], 0x50) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000000)=0x7, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @broadcast}, 0x400}, @in6={0xa, 0x4e20, 0x8, @local, 0x7}, @in6={0xa, 0x4e23, 0x9000000000000000, @local, 0xffffffffffff7b33}], 0x54) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000040)=0x44) 16:30:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 708.845013][T28191] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(0x0, 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:33 executing program 0: semget$private(0x0, 0x4, 0x100) r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:33 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20460ff7f", 0x24}], 0x1}, 0x0) 16:30:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 709.075989][T28219] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:30:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:34 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)=0x1000) r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:34 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0xf}], 0x1}, 0x0) 16:30:34 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:34 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0xc0}], 0x1}, 0x0) 16:30:34 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xddb36b79a5b6150f}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x8, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x10, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000004}, 0x40000) r2 = socket$inet(0x10, 0x800000003, 0x3fe) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x200, 0x0) sendto$inet(r2, &(0x7f00000001c0)="8f4c82d28e7ee63d0a428a73157445e633866f841e68d5ed59da557b87244bb7cd1da7b45f7d7cc7d30fc2ea9a3fc2765d806ab99777b2cbfbc55b7446ed6dc75200f86dcd1c0568437adb87c49e740c04885d4f81402685af922264dcc2edf02a18534af8f10def13e4568f285d7e187b4594fb180f4a88c30b487122e142ed576304a72f360efc5b59192a97d79f005bf54a134cfa46", 0x97, 0x20000000, &(0x7f0000000000)={0x2, 0x4e21, @empty}, 0x10) 16:30:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:34 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0xec0}], 0x1}, 0x0) 16:30:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:34 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="aa278856434fb27fe6383a724bce2a6dc02df91d0b7b0039c5f6a4764fb81cdc792b06cf6c3e1011ef735cb2bb7b48d0ad505704d47650b2f66ba3452017387c3ced6c9987bd7fd76b1f1339297d642dd43b67b7bdb92d8801", 0x59}], 0x1, &(0x7f00000001c0)=[{0x20, 0x10f, 0xb3, "a3c122703bc65e75d682daa4b92c"}, {0x60, 0x6, 0x4, "18ed9f0c4194b596bae37714760009a13d8f71f6901025973bb47f0789d10523c694ab42fe9d1fe6ddeb0a8a59beeacf400577eb6fe85cfcfae5d706ba64d21f86a1b977c69153e4cc21"}, {0xe0, 0x103, 0x9, "a3f7ba2b83d6052af297c678d8c652593af0cddaebb01ebade8c5a5e214d858fb807ffddd7a252311c2e49164589f31bff8741343d058270a9418e1f9a23c9b780ea5ac4d7fd1bbec54510d675938789abf4bfe8bac5808df0875ac182a2402c4b35b9103f7664103c383863cb63ddbb4dc510f0e17753953e01e50c83e42d060d8e03c210a005a7398e7cd1b9cae70063ba4ef5c7fcb8fb1623d4531329f2d0e488791712ce641f4946bbf2947c1d8be2582080ff92938fb3bfd1eb94ca82a63684f45fb05b1558bd01e3c85ca136"}], 0x160}, 0xc0) 16:30:35 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(0xffffffffffffffff, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:35 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:35 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x33fe0}], 0x1}, 0x0) 16:30:35 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0xfffffffffffffe72}], 0x1}, 0x1000000000) fanotify_init(0xfe553cd819d044a1, 0x48000) 16:30:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:35 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:35 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x200001a4}], 0x1}, 0x0) 16:30:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(0xffffffffffffffff, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:35 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:35 executing program 0: socketpair(0x1, 0x0, 0x4, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000300)={'HL\x00'}, &(0x7f0000000340)=0x1e) r1 = socket$inet(0x10, 0x800000003, 0xc) setsockopt$inet_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000700)="7d47000009933ba4ad91d685e6c7f8da23638dfc8ec4b3248ab79f5cd1de9eefd2eff5b9e63bf82edca58eff167ea28e97e134844d01e770970cffa6d18faf5491fff3d2c5ed03e952242beddd92a2a6f13935258868af0a779f9db670da07b14ba7d689662298f48c3c79d2404c8efa14c1ee0fb7c3b2611645bdb5366401ea5261d55c9131cbbbd86a077a85d5f54491fdb506dbb2887388a0f9f7900cd72b41e7b2e76f5fd8e8b11d1eee3c9a82e629a2da251c51ce51150c7bbf30fbbe66edded8f998464a3588a777cf6907acd92212ac9d34c40bb528835af100"/233, 0x39) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080), 0x1, 0x0, 0x36c}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000140)=ANY=[@ANYBLOB="02009600d1b289fe32f8dfe82411067012d00bb1df88c7356bf72b612c89767264f5d04fa6f114c5cab186a06056714487563c1931723b22c02214a524eb6a6ff4290900a81507d283749a82953b0328deac93842de8eeb1731436016ff4fa21900fff9df33b5bf7b892cf5b8d687a536443541ef43c552b8b91379681e6714f41893fd010a1465a7cba169dceb58f4e4b771adca64555d91ad3d1f4faead7a013ef9c11b59c12"]) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x200) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000380)={0x0, 0xf65e}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r3, &(0x7f0000000200)=0x4) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x36dcc848}, {0x1, @broadcast}, 0x8, {0x2, 0x4e24, @remote}, 'ip6gretap0\x00'}) 16:30:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:36 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:36 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x7ffff000}], 0x1}, 0x0) 16:30:36 executing program 0: r0 = socket$inet(0x10, 0x80f, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x5}, 0x800) 16:30:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(0xffffffffffffffff, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:36 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:36 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0xfffffdef}], 0x1}, 0x0) 16:30:36 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, 0x0, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:36 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000440)={{0x2, 0x4e21, @rand_addr=0xffffffff}, {0x306, @random="c569991101e2"}, 0x0, {0x2, 0x4e23, @multicast1}, 'vxcan1\x00'}) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30002}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x204, r2, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf65}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x51}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0xe4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x801}, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f00000004c0)={0xcc, @tick=0x4, 0x8, {0x1, 0x8}, 0x8e8, 0x2, 0x8}) 16:30:36 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x2}, 0x0) 16:30:37 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x2, 0x0) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000180)=0x1) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:37 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, 0x0, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:37 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x3}, 0x0) 16:30:37 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:37 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:37 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = gettid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) rt_tgsigqueueinfo(r1, r2, 0x13, &(0x7f0000000100)={0x16, 0xffffffff, 0x1}) 16:30:37 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x8}, 0x0) 16:30:37 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, 0x0, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:38 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000400), &(0x7f0000000440)=0x4) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000003c0)=0x4, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x5, 0x1, 0x4, 0x2, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x4}}, 0x7, 0x1}, &(0x7f0000000280)=0x90) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r1, 0x0, 0x1, 0x1, 0x8001, 0x8, 0x401, 0xc8, {r2, @in={{0x2, 0x4e20, @multicast1}}, 0x2, 0xfff, 0x6, 0x100, 0x1}}, &(0x7f0000000380)=0xb0) 16:30:38 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:38 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000100), &(0x7f0000000140)) getgroups(0x2, &(0x7f00000001c0)=[0xffffffffffffffff, 0xee00]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r1, r2, r3) r4 = fcntl$dupfd(r0, 0x406, r0) bind$isdn(r4, &(0x7f0000000000)={0x22, 0x4, 0x7, 0x20, 0x10001}, 0x6) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:38 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x300}, 0x0) 16:30:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(0xffffffffffffffff, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:38 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0xffffff1f}, 0x0) 16:30:38 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:38 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$netlink(r0, 0x10e, 0x7, &(0x7f00000001c0)=""/189, &(0x7f0000000040)=0xbd) r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(0xffffffffffffffff, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:38 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x2}, 0x0) 16:30:38 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:38 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@empty, 0x4e24, 0xff, 0x4e23, 0x5, 0xa, 0x80, 0x80, 0x4, 0x0, r1}, {0x6, 0x400000000000000, 0xf54, 0x7d9e965c, 0x0, 0x1, 0x7, 0x7f}, {0x9, 0x3, 0x0, 0x6}, 0x3d, 0x6e6bb4, 0x1, 0x1, 0x1}, {{@in6=@loopback, 0x4d6, 0x33}, 0x0, @in=@rand_addr=0x4, 0x0, 0x0, 0x1, 0x10001, 0x20, 0x67}}, 0xe8) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:38 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="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") 16:30:38 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(0xffffffffffffffff, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:38 executing program 1: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:38 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x4, 0x4) 16:30:38 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x3}, 0x0) 16:30:38 executing program 1: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:38 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) ioctl$sock_netdev_private(r0, 0x89fb, &(0x7f0000000340)="e9ad2c15a7b87a36f0fd9111d9a3f700fc242d2af919e13020ac8572e500397e6cb65161bed37a5e9f636f3b4f9abcf86989c21dd2caa87c38ac25bdc98ef566d27aa8c94eaaa517ab2314d0b8581f9ef21e2148f690cf0c68d418d0bf01ebc8cabf74b005dba99b71b69de2766a775125027a683808ef712a7eab9e72919599135d38a4d07a9228436e946549e2a5a46b97fdb248995ada4c74121d2f31f1e605889b3b7880c2219ab9d9894d57af0388e88c3e5a8f965acdfa1453c9185d06520cc1fb3690803e7bedebe82ad0d90f5d9b60b6e1d1993f2b93ef67757634ed519c") openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000240)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r2, 0x10, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4841) 16:30:38 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x4}, 0x0) 16:30:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:38 executing program 1: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:39 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x210081, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0x2, 0x9, 0xffffffffffffff01, 0xffffffffffff8000}) sendfile(r0, r0, 0x0, 0x1c) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz0\x00') setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000000c0)=0x4, 0x4) syz_execute_func(&(0x7f0000000540)="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") ioctl$TUNSETLINK(r0, 0x400454cd, 0x1b) rt_sigreturn() ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)=0x2) 16:30:39 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xa}, 0x0) 16:30:39 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:39 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000100)=r0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) r1 = socket$inet(0x10, 0x800000003, 0xc) ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f00000001c0)={0x13, "46c16b8bad6be8e0866c9f2838b7e3ea01d597e64e0c5d66f4c0bed42c8e1cdce73f7ecd097157aea11826ce4be3ba92bf3caef3efe341268458962a09284d134a4ae2596963c119ae6ce54a007bbb6749b76141cbdbdc22f2d5cf12f7c3ae2ab490ce69aab086e73330026187374e97a03daaa2c3596b67e6f9681359768e89"}) socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000140)=0x400, &(0x7f0000000280)=0x4) 16:30:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:39 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:39 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xe}, 0x0) 16:30:39 executing program 0: r0 = socket$inet(0x10, 0x0, 0x1) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x5, &(0x7f0000000340)=[{&(0x7f0000000100), 0x0, 0xae}, {&(0x7f00000001c0)="c6a3b465ad22a26587da39e1c170ce6e7961eddd5e391367b476361848901dcffc38720dac3af4c5291f2eb58b377eca2d9f81a7baf957eef7682d77c0752c60a534a3e458d2f4ca6d988963e506dbc3f326deec78146183ada17831d7adc8134684a5719c7ae7bd1bd87ee30cb06c5bc9d2cfdec4ff0fca5c4f1e57a229736d82ce1b6dc1", 0x85, 0x1}, {&(0x7f0000000140), 0x0, 0x4}, {&(0x7f0000000280)="58dc0db3dd0ad9d6", 0x8, 0xffff}, {&(0x7f00000002c0)="a90c3368eaa65540c63bf0a47f1625d474fdbd420aee644600031b15ccba72167bf40845f1055fc1ae80f6725cb35b78ce9f564943bc2e95ab1cea82ca8f66da31704d0fb843de0a369497d24fef8dda791642f4e96bde9fc72fdd55f907c8168890ccb6a142e6ede0", 0x69, 0x4}], 0xa00001, &(0x7f0000000540)=ANY=[@ANYBLOB="73686f775f7379735f66696c65733d7965732c6789a16f", @ANYRESHEX=r1, @ANYBLOB=',uid=', @ANYRESHEX=r2, @ANYBLOB=',dont_hash,\x00']) socket$inet(0x2, 0x8000b, 0xf6) 16:30:39 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:39 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={r1, @in6={{0xa, 0x4e21, 0x20, @empty, 0x7fffffff}}, 0x5, 0x8000}, &(0x7f0000000140)=0x90) 16:30:39 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xf}, 0x0) 16:30:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1b) r1 = socket$inet(0x10, 0x800000004, 0x100000e) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000140)=0x4) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:39 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x60}, 0x0) 16:30:39 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(0xffffffffffffffff, r2, 0x0, 0x2008000fffffffd) 16:30:39 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:39 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f0000000040)={@multicast1, @local}, 0x8) r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:39 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xf0}, 0x0) 16:30:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:40 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:40 executing program 0: r0 = socket$inet(0x10, 0x7ffffffef, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(0xffffffffffffffff, r2, 0x0, 0x2008000fffffffd) 16:30:40 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x1601, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000140)=0x7) syz_execute_func(&(0x7f0000000680)="650f5431c4c12d6d2b2c029676440fbfbf03080000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0f45c7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec0167ddea660f79cec462b1f72e63c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c64c422d58cba486b000066450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000005cf3460f2ad0f30f5ea5a9a50000660fd679caca3131b83a00a2f1fbdb766208cf") 16:30:40 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x300}, 0x0) 16:30:40 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8dab46f8b619c45b8544c2bfc33e389ae167198ca3dec9bd3e8c1dee8906918b46c8aa8db0dbd43c591e0ab9014ce6ea6615226d2e99ae26da03357b2403ced9f84a16c70e31cf7da368c70ba3d1fe3a9fbb9ddf2ea899b20b84a009028f9d00eadfe58df70de4ba25a12437d19409ad4bf4dfa4e67e34202e0000", @ANYRES16=r2, @ANYBLOB="00022dbd7000fbdbdf250b00000034000900080001000000008008000200ffffffff08000100e1ffffff08000100e30d0000080001000700000008000200060000000c0004000100000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:40 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:40 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x9b7}, 0x0) 16:30:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(0xffffffffffffffff, r2, 0x0, 0x2008000fffffffd) 16:30:40 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:40 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x7fff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)={r1, 0x0, 0x4}, 0x8) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001480)='/dev/autofs\x00', 0x101000, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f00000014c0)=0x65a4e81a, 0x4) 16:30:40 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") keyctl$set_reqkey_keyring(0xe, 0x2) 16:30:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffd) 16:30:40 executing program 5: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:40 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xa00}, 0x0) 16:30:40 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x7fff, 0x4, 0x1, 0x9, 0x0}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r2, 0x4) 16:30:40 executing program 3: prctl$PR_SET_KEEPCAPS(0x8, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:40 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:40 executing program 0: r0 = socket$inet(0x10, 0x2, 0x5) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = msgget(0x3, 0x504) msgsnd(r1, &(0x7f0000000000)={0x0, "9da6c86d7f140ef834c1010e17bf12d68298b25163ef7a73a3a654b676066f9178b1fd5ad6b9105372606bb83810f5317b2e27a33a9653178e525a424f5a3e28e6e149a2a0d825cf5209fec8e4bcbff39610a44dbbb0e57ff2ff5fe6707059a15109da690762"}, 0x6e, 0x800) 16:30:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffd) 16:30:40 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xe00}, 0x0) 16:30:40 executing program 5: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:40 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xf00}, 0x0) 16:30:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffd) 16:30:40 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x1, 0x40, 0x7}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x410041, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000100)=0xffffffff80000001, &(0x7f0000000140)=0x2) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f00000001c0)) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:41 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:41 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x3f00}, 0x0) 16:30:41 executing program 5: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x0) 16:30:41 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast1, @multicast2}, &(0x7f0000000040)=0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:41 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x4000}, 0x0) 16:30:41 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 16:30:41 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x6, [0x8001, 0x5, 0x7, 0x763f, 0x0, 0x10001]}, 0x10) 16:30:41 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(0x0, 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:41 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 16:30:41 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(0x0, 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:41 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) socket$inet(0x2, 0x80006, 0x5) 16:30:41 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x6000}, 0x0) 16:30:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x0) 16:30:41 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 16:30:41 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(0x0, 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:41 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) r2 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000180)='/dev/udmabuf\x00', 0x2) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000001c0)=[@in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x20, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, @in6={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x29}, 0x7}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @local}], 0x88) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000300)) 16:30:41 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xb709}, 0x0) 16:30:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x0) 16:30:42 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000240)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r2}, 0x14) mq_notify(r1, &(0x7f0000000040)={0x0, 0x2a, 0x5, @thr={&(0x7f0000000280)="6a14361a25fdf0440784984ba61b4812ae4dfc891ba0d4000a502a4fbf80da14fd29fdf51d22b542b503244ff4aee4d693ecf2a93b225f1bbd65d17b55c4cb739630379ec24f9e3975559e50910df0105cf4654680aac647fca2614eeb637e1c78f18e4acd1aba38178bec669f530be243b90bbc5a25bd851aeb4f988cabf6787121c9ff805e8501f8db0f43965bd773e9b90c6f6da57e921738fb3497ddc89e786faf4e98041b8c769f742cfcc6acc8869c7519118242b933dc689a3730f1efd278cba93293ba8c7e4818e758ed39241abeb471106569332517a5f7c54f658df2a9a0aab81d5b6727bf230cb4940288d58977f420", &(0x7f0000000380)="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"}}) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:42 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:42 executing program 1: syz_execute_func(&(0x7f0000000b40)="2e0fbedbd52b98cd801b69e4294de4e4629b5c7cd9d9d0c40f381cd6385f5bf9fbe23d0bee660f3a60631753c7e4c753fbc4e101ed41c109090f0dcc2a2a00c4f6407b80c4c3fd019300000000048f08eeeee0000080c4c3dd6d6807485151660fd0950000000050f26cf0807700cb0f61f300d1c4e1d1ee870c0000005bc4e1d5dc4b0045363ef8c4c1c9dd380faee42c240f5e5bf40f69e100000f10ebeb0d18c401fe5ff6e7df64673667666066bd43430f01c36666f68fc8389e8e04000000001411c4e2bd45937c930000") 16:30:42 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xf000}, 0x0) 16:30:42 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3a4a4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 16:30:42 executing program 2: 16:30:42 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f0000000040)={0x0, 0x3b9, &(0x7f0000000080), 0x1ad}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) connect$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x2, @empty}}, 0x1e) 16:30:42 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:42 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x34000}, 0x0) 16:30:42 executing program 1: 16:30:42 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)=0x0) capget(&(0x7f0000000240)={0x39980732, r1}, &(0x7f0000000280)={0x6, 0x3eb, 0xd51, 0x80000000, 0x81, 0x2}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) r3 = getpgid(0xffffffffffffffff) rt_tgsigqueueinfo(r2, r3, 0x3b, &(0x7f0000000180)={0x2f, 0xc6, 0x3e00000}) 16:30:42 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:42 executing program 2: 16:30:42 executing program 1: 16:30:42 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8, 0x80000) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/222) r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x10000029}, 0xfffffffffffffffe) 16:30:42 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x400300}, 0x0) 16:30:42 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(0x0, 0x0, 0x0) 16:30:42 executing program 2: 16:30:42 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001480), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1d, 0x0, 0x82000}}, 0x50) 16:30:42 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) sendmsg(r0, &(0x7f0000001900)={&(0x7f0000000100)=@ll={0x11, 0xf5, r1, 0x1, 0x3f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)="1b84c2d2ece0d8c2396f0a1a583d94eb1b144d932cb1c71dd0500b7d8f4a8e5b6a1d10fbdfa34d1bbbc7d6ee4e02576b55e0ca7f9b6619bcfb2584124ec5b1b171988db0642620915573f49f9339464d22e18be5f8747181b0193c5984263d4121bf125311b470abf3620da9d9419de077f41c5814266213344aa576", 0x7c}, {&(0x7f0000000240)="ff17462e3f8226160a73df1cc83bdc6da25531a6c0a95d2e7dc60a99f579cdf02c4ae342369c92c6c93ee7b8cea4ea8d88ea18d8c26d146d62d0b1d24f29bcdefef40d71bb0c5fe530a0967e68b903c0be79c3e40c4dfd7f18051c6332c70608db42f6920206dbeea450072339969cf7fde27421a2ef9ba027a47f99640a35b461ed97ceef69ae361941d4a2b3bce1a8a44a4d1c8ac622f2c685cc2aba07f37f", 0xa0}, {&(0x7f0000000300)="9421d6f8eb659e78f4f7274249ecb490536f77c125f5e9a5ee659b152a31fa85cf99e263787001f951478d1846974e27fcd1c16add3ef2ce5aa244a130c6a3d89243ac4f44f1e74be349034ca6c4ec5e", 0x50}, {&(0x7f0000000380)="2f6358201699c266c7d66f31776dd8ab76993f9a0e939b70d646c29b84104dbe3694c3df3e7bb929c39d4d45aef806d65a94d18355bbca25b193e977c6072ba5bade3cebf4d6872f9e0e5a38ec87dea19a41a0aa2a4faccc3faa6e037f00fd5ad7e197768e213cd30e015a9d85dedf69418e9f4f74878a21fbaf2c871552389eaceacb9b7a78f1fd", 0x88}, {&(0x7f0000000440)="a9ec036aede2809090aaa799ab7ca970e4292ac09cf7ffcd74b15d8e7317b1d4d8fa0d1aa13392ea9d9302979fa2ad5dc48b5ccd13f1e1b10b7f3bff5723d59d584c0d8d5d9d49d9d119aa922c62b5f0e7b755b59160f310c76ac128c26b95", 0x5f}], 0x5, &(0x7f0000000540)=[{0x1010, 0x113, 0x4, "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"}, {0x58, 0xff, 0x2, "9fb93512c6d98a62b793dd7b3affcba5946e267726531550a41325676ee47c7d2bc8d9833b66e9a379cc31c49bfa88729fa6f2df6d78666b27c818a5728032edf883e6"}, {0x108, 0x117, 0x7, "04d8a9ded4ab09d5635f4ffbe59b4590013e478407c1cc44290de071771d3a0df5ed1057416c6654aea01b8cedb7b18be229f0c1ec64e196b193080403553e2d463bfe0dc64d539e74fd1659213067ab2691304499698687df4c736e86e09fcb068b60586bb4750f47216817dbcb9803cb6a252561b0130304c775d3a83c866b6359eae6941d5dde5ce339fc3de6bb9da1b03a5a5d7f5b6f530577ccb93ac81b2cea6e93961e4460f81dad6961f55b422faa89a1bdb194f9fe957f5222622b3a848cdb0cc81cf43b66c8036c12615ba765ce8ef08ef18b556a0682709055685c760940a77d9ae548f32193d1aa1b1f1892767037c9dd38"}, {0xa0, 0x113, 0x10000, "61238114e3694682061448b70b1014f9edffde7cf57e0e347eb53b44b3299fc7e3032eaa12c296772db68ee1fc80fae1f903d7a55ef294c82224e95d9d42766ea0ead0c3eac4bb7fcfa1e80f87da836ff10913809f75cf6f41f1b30b97089b82f068bf6ccaf05c6a43bd8e6e42b3e7e77129a6d9fc3b69870cca54a7ecc05da9173c02e3ddc555d25d4c4dbf64b9"}, {0x70, 0x114, 0x5, "4f7d5345df14de4483fca313ba777eb8dcc53e8049cd20680a79997da2c06df6ee117468c4206e9c0f01c72b89818e717d3ac2a698d45a93c81596cace79ae89c7daae0646f4c6c1705641701e5bae70da7c158cdde457da8d677e8f"}, {0x18, 0x12f, 0xfffffffffffffafa, "12"}, {0xd8, 0x117, 0x164, "4aa027fc0c779bfc24fe4013145ca07e3a711453f4cc9992339bec99b7c1def2784a1f69174d8c8ec73bc8b117539b26ecc0677c3d1086baad6d95a51c4a95c65dab8d4bc7072a481ded6098ece831b8571bfade77dfee71b40b8781b449de8da344bdade979aa62d3877dca845b520a2954d87d547917c8563fbe5636d0dc81490ef9d2b477e5ca58289b7994fb62c786a8063cb0d4626b7d80e4ff6c714523dded822bf207eaec3fbc650a86d52e79d4beeea9c5c32984d2baa977342f4693fec015"}, {0x40, 0x10d, 0x8, "09f2bf4128e6737427b2b3aac7ad954ca8f72f201eefb2b0c324d37b29144531b8c853ea70acabdf874cf09d7c"}], 0x13b0}, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/vga_arbiter\x00', 0x80, 0x0) recvmmsg(r0, &(0x7f0000007600)=[{{0x0, 0x0, &(0x7f0000003380)=[{&(0x7f0000002180)=""/4096, 0x1000}, {&(0x7f0000003180)=""/143, 0x8f}, {&(0x7f0000003240)=""/240, 0xf0}, {&(0x7f0000003340)=""/52, 0x34}], 0x4, &(0x7f00000033c0)=""/195, 0xc3}, 0x80000001}, {{&(0x7f00000034c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000005780)=[{&(0x7f0000003540)=""/82, 0x52}, {&(0x7f00000035c0)=""/4096, 0x1000}, {&(0x7f00000045c0)=""/171, 0xab}, {&(0x7f0000004680)=""/4096, 0x1000}, {&(0x7f0000005680)=""/10, 0xa}, {&(0x7f00000056c0)=""/190, 0xbe}], 0x6, &(0x7f0000005800)=""/168, 0xa8}, 0x7f}, {{&(0x7f00000058c0)=@ipx, 0x80, &(0x7f0000005d80)=[{&(0x7f0000005940)=""/177, 0xb1}, {&(0x7f0000005a00)=""/148, 0x94}, {&(0x7f0000005ac0)=""/248, 0xf8}, {&(0x7f0000005bc0)=""/191, 0xbf}, {&(0x7f0000005c80)=""/213, 0xd5}], 0x5, &(0x7f0000005e00)=""/36, 0x24}, 0x7}, {{&(0x7f0000005e40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000005ec0)=""/65, 0x41}, {&(0x7f0000005f40)=""/248, 0xf8}, {&(0x7f0000006040)=""/149, 0x95}, {&(0x7f0000006100)=""/186, 0xba}], 0x4, &(0x7f0000006200)=""/187, 0xbb}, 0x7}, {{&(0x7f00000062c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000006400)=[{&(0x7f0000006340)=""/21, 0x15}, {&(0x7f0000006380)=""/107, 0x6b}], 0x2, &(0x7f0000006440)=""/36, 0x24}, 0x3}, {{&(0x7f0000006480)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f00000075c0)=[{&(0x7f0000006500)=""/45, 0x2d}, {&(0x7f0000006540)=""/66, 0x42}, {&(0x7f00000065c0)=""/4096, 0x1000}], 0x3}, 0x7}], 0x6, 0x1, &(0x7f0000007780)) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000002140)={0x1, r2}) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001c00)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000b8040000f8000000f8010000f0020000f002000000000000200400002004000020040000200400002004000005000000", @ANYPTR=&(0x7f0000001b80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'/80], @ANYBLOB="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"], 0x518) recvmsg(r3, &(0x7f0000001b00)={&(0x7f0000001940)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001a40), 0x100001da, &(0x7f0000001a80)=""/99, 0x63}, 0x40012022) 16:30:42 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xf0ffff}, 0x0) 16:30:42 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x58000, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:30:42 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(0x0, 0x0, 0x0) 16:30:42 executing program 2: 16:30:42 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000040)={0x3, {0xe7, 0xffffffffffff0001, 0x4, 0x1f}}) 16:30:42 executing program 1: 16:30:42 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000440)=0x9) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x10080, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f00000003c0)={0x2, &(0x7f0000000280)=[{}, {}]}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000480)={0x0, 0x6, 0x30, 0x8000, 0x80000001}, &(0x7f00000004c0)=0x18) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000500)={r3, 0xe9, "c052c0f0ead035a1aaca08556d71b5a25b6b7a03853f9ec9d4887b77c7f887d8d56db0b175ab63c6228e3896840c046609ec007c50202cfc20c0efffc7c8b4bdfeceb9020cea351f5ed072ff0c82478a8324b2b2f5445689009a1431d0b4f637b0e6a98f1bd587ec9e3725d8a37a8e53e4f7841e0e430ddf88a85f9a07ac017e3a5c16b9c16a5ca7efca0cd944df6e47becf7c30342e1c4025cbba89c0c2c1e0b8487d36b215f05b44d51165ec601d74427b3ad138b5cf70f0c096fbe0fc09ca54f9369b041435293e6fa5977806f2fa1477dd8f1a637bd0b74180e8f571393199d31dad92c62e04b9"}, &(0x7f0000000600)=0xf1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), r4, 0x9}}, 0x18) 16:30:42 executing program 2: 16:30:42 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(0x0, 0x0, 0x0) 16:30:42 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x1000000}, 0x0) 16:30:43 executing program 2: 16:30:43 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) pselect6(0x40, &(0x7f0000000000)={0x4, 0xf45, 0xdbf, 0x3, 0x0, 0x100000001, 0x3, 0x3}, &(0x7f0000000040)={0x3, 0x3, 0x3, 0x5, 0x3, 0x5, 0x1f, 0x3}, &(0x7f0000000100)={0xfffffffffffffff9, 0x3, 0x2d, 0x2, 0x31, 0x3, 0xff, 0xffff}, &(0x7f0000000140), &(0x7f0000000200)={&(0x7f00000001c0)={0x200}, 0x8}) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:43 executing program 1: 16:30:43 executing program 5: 16:30:43 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x2000000}, 0x0) 16:30:43 executing program 2: 16:30:43 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x100000000) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x40400, 0x0) mount(&(0x7f0000000400)=@nullb='/dev/nullb0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='xfs\x00', 0x2000, &(0x7f00000004c0)='bdev\x00') getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={r3, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x0, 0xa4f, 0xff, 0x9, 0x80}, &(0x7f00000003c0)=0x98) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f00000001c0)={0xebac}) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r5 = getpgrp(0xffffffffffffffff) kcmp(r4, r5, 0x5, r1, r0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}, 0x9}, {0xa, 0x4e21, 0x8, @ipv4={[], [], @multicast2}, 0x2}, 0x8001, [0x1, 0x0, 0x6b, 0x5, 0x11, 0x9, 0x9, 0x1000100000000]}, 0x5c) 16:30:43 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="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") 16:30:43 executing program 1: 16:30:43 executing program 5: 16:30:43 executing program 1: 16:30:43 executing program 2: 16:30:43 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x3000000}, 0x0) 16:30:43 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f00000001c0)={0xb, @pix={0x9, 0x5, 0x0, 0x3, 0x96, 0x5, 0xf, 0x6, 0x1, 0x2, 0x1}}) 16:30:43 executing program 5: 16:30:43 executing program 1: 16:30:43 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x81, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x4, {0x400}}, 0x18) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x40, 0x80) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r2, r3}}, 0x18) 16:30:43 executing program 2: 16:30:43 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x4000000}, 0x0) 16:30:44 executing program 2: 16:30:44 executing program 5: 16:30:44 executing program 1: 16:30:44 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000001c0)={0x0, 0x0, 0x2080}) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:44 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) syz_execute_func(&(0x7f00000005c0)="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") ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000140)={0x5, 0x3, 0x7ff, 0xcd4, 0x8, 0x1}) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0xeb, 0x1, 0x7f, "167a285c90a43caaa5d7d3651ef9902e", "e89ed369dc2c05605bf53cd98d98ccd9a9d3ce69c3cd42f8e888205720a6bd3f657f5b56c5601f192f3a4933d156fdc8ff37e8f4503afba036e591dbde1e193e355e120430d0a610c867c0837a68d1077efa8d165b0eaa0163dde428c5fc8cad4997e83ed4782fbe33f34963c5132cefadbe3541587e6340b2038fa5b552f2d4673fe0daad2fecc523805807d5a02b95654243bda71d212140de91bafd71273e1913df9fcba4248046c43900fa66c52e7c7814253612cc316874e1489a705b19921e1bb3b1f234cfad3f01b56711625a3b5f5b9135b8"}, 0xeb, 0x3) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0x4) 16:30:44 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xa000000}, 0x0) 16:30:44 executing program 5: 16:30:44 executing program 1: 16:30:44 executing program 2: 16:30:44 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xe000000}, 0x0) 16:30:44 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:44 executing program 2: 16:30:44 executing program 5: 16:30:44 executing program 1: 16:30:44 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xf000000}, 0x0) 16:30:44 executing program 2: 16:30:44 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x300, 0x0) 16:30:44 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x505001, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x3, 0x8000}, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:44 executing program 1: 16:30:44 executing program 5: 16:30:45 executing program 2: 16:30:45 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x3f000000}, 0x0) 16:30:45 executing program 1: 16:30:45 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) setsockopt(r0, 0x48, 0xff, &(0x7f0000000240)="a7b914242e311c589d521ec3c403c77d37f42eec6bb99fcaf05edd9aee70219f0cbc93d3410e7a90de425cd20b1284b472bfb67be859916e3908ba00fe482ea6e9af2cdd0399eefe8607ca256bea32b36e593a54a6d58d1fca974fdce8ebd87e0e2ade5a45b8a5528b21d545d24115ee238255c3b23b484ead", 0x79) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000100)={0x0, @aes256}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f00000001c0)=""/76) r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:45 executing program 5: 16:30:45 executing program 2: 16:30:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4000001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f00000001c0)=[@acquire], 0x0, 0x0, 0x0}) close(r1) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000100)=[@dead_binder_done={0x40046306}], 0x1000000, 0x70c000, 0x0}) 16:30:45 executing program 5: lsetxattr$trusted_overlay_redirect(0x0, 0x0, &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000100)=""/145) 16:30:45 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 720.710743][T30900] binder: 30897:30900 unknown command 0 [ 720.732199][T30900] binder: 30897:30900 ioctl c0306201 20000200 returned -22 [ 720.758309][T30902] binder: 30897:30902 unknown command 0 [ 720.768710][T30902] binder: 30897:30902 ioctl c0306201 20000200 returned -22 16:30:45 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) sendto(r0, &(0x7f0000000540)="8a1d43a7826fac265b8573bbf199087676ba91fcae33d2c068d886fa9947dc36ce3e3662bef6e25340e479c940dc04d83cb0de51787c9a524740c630404b7d27b1bde3d63c7176dbec26ee06b20df57662e7313151f1cfa086274afb68ebe9971f48ed09cd2fb33142c058c6f7e8928422213eb3a3dc13e46b447267561242d0a85fadf5c95ebe8ec6f52daf5cd58c4ffd7433faae13be5cda088fc732e78a0e998262f20d1cb4a7496093d11dfc8623c4ad4e15a3f209cfd476dddc00dcc4f8f3fb936afa26fab1e7c049c6ea8fc241c9e3f016e9b3aaa64ceb34a75733", 0xde, 0x4, &(0x7f0000000000)=@ipx={0x4, 0x3fc00000, 0x9, "dd5f5e8844f4", 0x3}, 0x80) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000100)="344b0690d989243b70708816ba0e67474a6b2ce883e7bfffe60e0ac7f0d600632b394bfc852db56eec98408ceaa87a3616f8d4a737e223fd07d178df053a0571b522189bfde20bf2e143fecd047fcdad556ed5dfc9e5c9efc31c9f3dcc7a045c89488d9699bbb00fb5972a5dc795225b", 0x70) accept$inet(r0, &(0x7f0000000380)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x121000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="700000001aa2a43ff92e09779764003ec6d06229536eba53d0b5457457efdecac36a61e3f46614027bc56cd3987df538e822358ea5b6b75b2041586ecb5d0f1a954f9ce4c284", @ANYRES16=r2, @ANYBLOB="110029bd7000fcdbdf25050000002c0005000c00020008000200dc0000001c000200080002000002000008000400050000000800010008000000300007000800020003000000080002000000010008000100400000000c00030000100000000000000800020000100000"], 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x0) 16:30:45 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x40000000}, 0x0) 16:30:45 executing program 5: pause() syz_execute_func(&(0x7f00000003c0)="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") 16:30:45 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:45 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x4, 0x200) getsockname$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0xffffffffffffff54) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x448000, 0x0) syz_execute_func(&(0x7f0000000000)="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") mq_timedreceive(r1, &(0x7f0000000140)=""/207, 0xcf, 0x811, &(0x7f0000000280)={0x77359400}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000003c0)=0x6) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0x80000000}) 16:30:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4000001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f00000001c0)=[@acquire], 0x0, 0x0, 0x0}) close(r1) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000100)=[@dead_binder_done={0x40046306}], 0x1000000, 0x70c000, 0x0}) 16:30:45 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x60000000}, 0x0) 16:30:45 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 721.260452][T31014] binder: 31012:31014 unknown command 0 [ 721.285805][T31014] binder: 31012:31014 ioctl c0306201 20000200 returned -22 16:30:45 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000040)) r1 = socket$inet(0x10, 0x1804400006, 0x17) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4000001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f00000001c0)=[@acquire], 0x0, 0x0, 0x0}) close(r1) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000100)=[@dead_binder_done={0x40046306}], 0x1000000, 0x70c000, 0x0}) 16:30:46 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x9effffff}, 0x0) 16:30:46 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) setsockopt$inet_int(r0, 0x0, 0x4, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x6e) 16:30:46 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4000, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000140)={0x80}) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@remote, @initdev}, &(0x7f0000000040)=0x8) 16:30:46 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="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") [ 721.518528][T31231] binder: 31230:31231 unknown command 0 [ 721.537680][T31231] binder: 31230:31231 ioctl c0306201 20000200 returned -22 16:30:46 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x0) 16:30:46 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$pptp(0x18, 0x1, 0x2) syz_execute_func(&(0x7f0000000000)="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") 16:30:46 executing program 0: r0 = socket$inet(0x10, 0x80805, 0x4575) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x260, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x17}], 0x1}, 0x0) 16:30:46 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xb7090000}, 0x0) 16:30:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffd) 16:30:46 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x2) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000080)=""/136, &(0x7f0000000140)=0x88) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x1, 0x0, 0xfffffffffffffff3}, 0x0) 16:30:46 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xf0ffffff}, 0x0) 16:30:46 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(0xffffffffffffffff, r2, 0x0, 0x2008000fffffffd) 16:30:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(0xffffffffffffffff, r2, 0x0, 0x2008000fffffffd) 16:30:46 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xfffff000}, 0x0) 16:30:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:46 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xd) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:47 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000140)=""/175) r1 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x147342, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000200)={0x4, 0x800, 0xfffffffffffffff7, 0x2, 0x99, 0x80000001}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x82b2}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e22, 0x400, @local, 0x2}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e22, @empty}], 0x78) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = getuid() setuid(r3) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x402203) open(&(0x7f00000003c0)='./file0\x00', 0x20141043, 0x0) getpriority(0x2, 0x0) syz_execute_func(&(0x7f00000003c0)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f7000f9a5800a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc663e2e450f0fd2b4c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:30:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, 0x0, 0x0) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:47 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:47 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xffffff7f}, 0x0) 16:30:47 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) readv(r0, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/191, 0xbf}, {&(0x7f0000000280)=""/197, 0xc5}], 0x2) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4c800, 0x0) write$UHID_INPUT(r1, &(0x7f0000000380)={0x8, "c51ea62fa8d2a24da6bc9fc6d4453d03fd14de0bff092df55e4be7944e48c38fc0662cca4f90a586bfaba2000cd3b3cea9c8279fbd94ee57c416213b0d7352ebdf47eb72ac15e6eed20cb24016723d5a6d6eaae93bd20f4323861be5e3e9803ccad64818cd6a7fab1e4eb03879e52b5555e34526f0d696cad547e2c8eff272f239bd203bae8f1f81e91d821e7a7ca0082f653ee89986d558a1c3d61ae1c3bb55b10f945b3d6a188079bb343d9e2cc2956806fd88e80e480ba3c80ae8f87686487fe70f7089d4953270897e7a07e03a1280635da486c5f3ae664dfe12eb836ba3dd0df9db853304d3977032d4795a7d64164b0128c760ca39c7caebb6f628d69829285908064e30d82b47726f3ac9bfb2ad607130a6cc316c4e1c2ef52dd8fa4579f74c2bd262a19c54abce6daf71b9a2a2bd26f5201ec4f8a8b15212c60cfa61bd2adbf886afb414d05c69416195da8f7f72b78539fef83f2ca8402ba8d4c60bbc539043f3cc4cc38f36d13bb7697b5754719964c3f82f6c70dd7e7e7c0cb1bcbef21afe6036586c0eb9734e8c3c08a70174dd49f60de7cd48117215c26db4ffd96bea9fd45ac9f9dfc4bab125f9f3eb37c7fc9c80f6e734e99165fa26a188612a2285c7254cfe3f46a15ee3b846704a3bb21e082b0a80ece42cdaa8ab55bbcf9c23888b8aff9cf31a1f4ccc672b31ff73cc78cb751174d6e59e80b9e15767622146c54313c2e9fef412dea0b87b80b6189e4810e07961f893e535c31a55808604a8ded0ab00348f0354116ef9e94a852bb9d64e665ce2d8498073564f53ddb8164e7696cc2a8424aa92391bde86f8e626ebc4e8d98326473b06329e525c45a0ad26a15f58db4c9efbcb6f1470e6d8c4209b5e8f4c21c1ab0e76cb1f847bf93bbe813ce9f5687eee1712de8a512fdb5b84e591d8924f8d1d8230f581c2df27e7eeece6895edcfcb9dafb52888800c8226d84552571e49eec7ffba99e9ba536bdc280e0c90700a205839ac9dee051f7de456f48759dbb16d386286a4ed52a39aa085beecc974a8b690a664b55244b5eeb35da0c22115f583eb6f0392d902281e30e0727b5358d92ed9119db1ee5a4eccf691fcfad515bcd8dc7fefad7173fc4ff9e280fd1e575acd18212603da3556800ea624d64959eae9add0267fcf1648d289224945b816a2f79497c54edb0ccb8f40318773df697644cee96482f44b41e220f7ff4ca36095b518ead756d68110ef3001f56482c8a479bba2ac19ded6b2b51bb6dc631f2eebe1657dce37a913e1d9bf9e4765c07b961279f6925a4974c90998560de188747635e79eb7156169c6ea75aa5721f88571b28621a26fb5d4f0c8575fdc849f1bea72d225037610816fd8b2f5ce5a3c1366c12e2011845eb910eb5d05f6da9abf628258dfa77f68aded13a1ee6a4e4da7f18d47b7d7b0ec3d94a38561f79e17cdb59370270a25f27830eb9aa0ba4a8ac1cc27b7ef61401c06d0517f2eee7f5fa509a132e26e1b21e888affb2bc303adb656290fe5dba0c935f24042472edd8643191c8ba29cfcf28236300f50af00a6df6411517c9353544182fd93bc85b8b00e095585ecd3601abc46b37c05790d4449802ee36c47090c2e998139cdeef024860194befcc98ba8638f0570b91bb2d8dd4c70796cb3233cd6ff734ea6f7a42878cdd0bbad985032b9033b7854a49b79bad8f9e64ac8ac3b35c3c1ccefc05cafbd5f517f3d22f97e135132c20d48d156ab36ab5a3ee70bbdd0152bb0c6c45da0b40248325c08b6a75c7ed939b623700f83813ab55827b39d5b2c6c027057003c1d639f3cfcd05040e8bfbb7bcac44ebc51ac7d833ac0f3d045e41d0398bd4aba84f22451648d5f453b74c4a863b6484b11124213c9874b7dd5732925aa089c88567cf6cf649b2df58f14a5ade3194ff38bc6f48b9f4575ff2aa0672081cc02598ffe3d22ef3e81ad931e798f90a76ade6cd6d5d5759a44d406fc40a5fd028764af0698400970114e52ae98275e94384a0f6fbf74d57c8891f1360837ba0ed3d98bd4e1084ebb8e3008663fa4c61ad71daebd8cca10309cab84ab2423779147fc1f6ff1d4cda19f3d5c14f3d3c244431554270b042b46f1c030c87ce9ae705800328c9c292876802fafa9d4ba082c84d946c68c4ed4b6523b6066073f4797bbf485c978d97c7d991d5445a20659925f95addfe9b0df6c863531b1170b585f536a96d47ea296a0e175401e9712c1e2e96e1146105462f8ec086626c1caaf4e40f7bd936b11bb38fff96ae925079ff8564479d3b4ae9725775b8a229a17a581211db91f472b85c537fe20063b07dacc56c425a7b62c943f5a888df48da87e00070fd81e19c83390cc3d5ca6e76c7900b04dcac8067e1baa395730a2e0ef563c2a7b632bfb6201c26f0ad8214568d6cab5a33d9d265dab920fcfb305f9ec3a8edad527044379ad804b48e24817399c84e5918c3e536e2bc6adbdc6ed5eb1c2b278c916e8d5f7cda6ff655f363926056149255ca30608dc5ba3671f12f88bb1bc550d97278229d734e90b3e9bde6bd3d31166dd7fbfb39218a8cee1261281c6b6420ce50f4f26d3d8daa9967483244439a60e91423ebd99a26eb19a6bdf5dd72f93ad7069887c5d299048773f5087fe2f5dd488e848c3496ec64b25c6eba56e903463b80900b18ef766601b35ae64ebe43d82ca36a271ec89a57dd24d19c3c52576dbc64a091ab9e38485fd52acf15eb64b18121a21e34f8f1e91a085dc9165058906bab1977b19399fb86be650c3f8a63fa64267a79aa777b189bb3f51c724d92445917ac0059c2d4fa2de3c958a93a55d37bc0cd9b913f264523532ee144c13e99498148e5cde4d05006c5f14bd55fb0c8838d65dab744648e09b576df334d93ac50a3dbb44b45a9bbbcd5ec7be9688d9f3cb13e1a25a73d07db662bf55fd2bdf20d6cf547d55314604e3e509d4d609cb9623e0136a6dd5a90b72035e2194ac39d88b3d6b572419c20e5b6f25d78a6bf8da73fca85d22bf5500ae8e6e982faa23d3adf1c1b530e28c2a90c7cd4537be25e233a1c9e01e152ca821224106b44f5ed45748d93912cdfee59c795febb6ae939821e69e6c03a5fbeaaccf2d4c3fafbdf8ab8d3bed1c4f88798ad59d6c89bb5a02ea7f603e90909519eb05fdf65519b3e8c589833d6fdf65e19fe6473c838bad49fd47a75444e6b5dda76bd5039a9ab53555c5c51d49d02fc0f92c9f5714fc61a46c9e929a07079445b34d4e6ae980767fa434386f7de3511111e0b044cdea8c7852209b56e6c42a4eb1c74b023d616df1080e9d9f22a5bcc2b5cdac5bdae2bd5b6f2a2d704402ff1ce242a6cc974ed2e28f09e7d1116d3af841bb395382ddd1868b914647b2d780d12143eae793df698ff1f6168f921bca939c8cea426b3110f1435db563dde9b16d50b34993fb89cb1ae182c8adc8f8beb31ca44685405a4df02685f672eb717f89516bd7270b4a4c03f1aa52fb8593ee732a0d471b7b9d7446e0f450854be29aae30767afc0cbe2f121beb30ef260700a05f996ae9da929c8e1f67fb7fb7054d483ea9aa0c520a677393f6625147c97ca320445d33c9d5b2d75f87b9149c5871d046d5be046cae032c65f409bbd396b0002c041137012936b8d75bdedfe72f7d0c5063a7e52de2202df3223627742677088b4751deb79aa919fde1b7a18186f7f1f593e1e87fb477456fed870bcd59035b7bf6fffcc793c71bb8eca55c276a4dd65fbfbe6e3ccd92dbb436d5fa924e834e2fe90281706dd324a3e39870f3628970f65bd2e76e4a61f7c0a7db1a9523eea5525a882fadc72ffefaf4fd367361f420c67ac5db217a32d92d81ed1a8cad8fdaf8874351830414bff09a0785baea949d0198a566b59f612248b2b98177d81d2b760dcbb2ba32a052b3d5cb5ef452af21d290902f293966f3c6f8a11e4da5eae9b18e8560aae592895a325265f733b429724d909cd377de6e649b64c55424c20ca5d44237bfc6a0ed9bd622aa4c68b09b0629fa6650c501fc426a893eaf4d110cf297a03b70cb3c1d759a767b1e2a041e64604aec796cc00eefc2ff0171b157f11e84fb06d4d168e3e402878e0351aeb698ba61d98d3e036b4ff14c133f888b5fb71ff47c58c945f4fc4f8dbcbecc9d35157afb4ff2de6edb233172cb16b0354f4e92b7bdda1b95c121fe182f1d9430d0e7f9271f6e70a9aef8d2d60e93ae6a35ebffde58b90300ce6a63c9afe20d8ea12ee36ee730fc9416b617299991757e3119ebdb10a7d690b47ffe16977b29456ddecf91c73c754d81e58c839447b315cbc61925d08967298d79bd6b8c9fcd3f4c4598b590aaf6e98433bd3de809e5b6de26c9690c2a57becf52b510b0b7eec3027310d05ef5ded8ccc8dcb558a14d1910247103d4f8ed5321543dea4033fc954fb6ac93f235d84ec003d7fbce448add3452b19404c23c341f8698e79b59f3819ec6cc8957a4d7fdded7fdbe5b24c361dacaa9e172f2b3f6eab72ec12342ac94dbc35f05126e78e74927227701e325c5187c6759a2daabe86cbceae304520ea22ae3308b2772516105bea8f9e57820efacd7d7f5eeb3259c628b9e3efd78e184b9e59a6e0b264bdeb4f5306e6bee755bbe9a3174df45042137fa5e881d0c2af6749cfcd3495b19ce515c5b08bbbb59ce97c866ef3f8e5c644886d2c2f6f63be3dc369bf4575acc40471f66d7f82a1f9837c398ea3894cfb6ea2e4b32e8c2ae72b876cc302e9b8b79f7720c369888d51a49003ed38a8196319ca2942bb9ab407eeba0c4903d0e6fd11a29f54c27f62ed656de4c0d4ee7d8619902664df301f8a44f81f34e778ca09aa8bafb6e4bb02bf037730904491e55c599a50a980ac3e55e67f4b510324804a03955405d707063b98773639a75ed9a965ce39dad852bf7443988c743c30faabad82fbbec64c5a9ffb0bfde375008db35450836370d4716e7886739b1732cc690ec53c7b17e75f4313bd9ea16b6d46c40cb0482fd2d388baa6129857177bdb3ef54797d19aedd317a451744aaad54e0eae05f747a264ffc3aa680ef864db0380b5d2b5ce166a56071cfdc04f4ad5a5b8aaabae906ca05a8c0c71b22701b3528d66cf157e4d46e40ef9ca441ecd7f53c4ff9f59893a1b1de32f90891f6000fdf2817192628637cc10c3504c6a5199427fd5ac79581dbe5256b2bef83dca845d16c9546305e57d8b8d6db18eaff68df4b6fed5ddbbc162a832e635843680a27e7128e766a533957ecf582d9088a092f9b3604673f80916d15b360240765c04e2c6aaa34df6be210092ba6fb2cdc160f43ca4161174746584738c68d4925dc3806ba0d32c6916bc0a8e1a22248bcb42713b1580b24fb041b1ad0049adefc752fbba567fd8b84d042fda426d873385c139610ac3f5c816bad7f6c5d75927c1d0ec5e699994959f2473fa9028e76de39734c9a86fb5a5a5a482a2a576a3a101af929108feb1944e53f61675b089001c52f5660d0bb8964e10f64b58c89778b37f1c38d9c54fe545f0b80660b5fe7d1846c6427bee9ec2d2eaf50ad32d0f92dffe5d47f0cb19f8dabfb8d6d2ec4d9cc7167fcbb8ad0791921065b614d9749099af44942e1f9846444fb44cc3ea22bddf9a06973b52292240e89c6c8a6577935987900a55009b35776b0436c81ac21564da8afb56d0072d26ddab448ad9a399468b699ec753cdf52f772487ebbdf81824421fd906f07dac155511f00e657428af4b8c74d069858a56b77c49243682544ea1fc61889059b10a0c797372cfe2c463", 0x1000}, 0x1006) dup(r1) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0xb3, 0x4) 16:30:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:47 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xffffff9e}, 0x0) 16:30:47 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:47 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) dup(r0) 16:30:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:47 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xfffffff0}, 0x0) 16:30:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:48 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0xfffffffffffffffa, 0x0) syz_execute_func(&(0x7f0000000340)="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") 16:30:48 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:48 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x101401, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x90000004}) 16:30:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:48 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x40030000000000}, 0x0) 16:30:48 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:48 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 16:30:48 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:30:48 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:48 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000100)=0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x7e, @dev={0xac, 0x14, 0x14, 0x27}, 0x4e23, 0x4, 'nq\x00', 0x8, 0x2, 0x7c}, 0x2c) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3ff, 0x10b400) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0xff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e22, 0x0, @local, 0x8000}}, 0x1f, 0x7, 0x7, 0x1bbd, 0x5}, &(0x7f0000000300)=0x98) fcntl$addseals(r0, 0x409, 0x9) 16:30:48 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x0, 0x0) dup2(r0, r0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xd1, 0x200) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x2, 0x2) 16:30:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:48 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x100000000000000}, 0x0) 16:30:48 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) 16:30:48 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000040), 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:48 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:48 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x2000000000000000) 16:30:48 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x200000000000000}, 0x0) 16:30:48 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:48 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001180)={r0, &(0x7f0000000140)="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", &(0x7f0000001140)=""/11}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000011c0)=@security={'security\x00', 0xe, 0x4, 0x3c0, 0x0, 0x0, 0x0, 0x220, 0x220, 0x328, 0x328, 0x328, 0x328, 0x328, 0x4, &(0x7f0000000000), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x17}, @broadcast, 0xffffffff, 0xff000000, 'teql0\x00', 'batadv0\x00', {0xff}, {0xff}, 0xde, 0x1, 0x2}, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x9, 0x7}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev={[], 0x12}, 0xbea, 0x8, [0x28, 0x9, 0xc, 0x1b, 0x2b, 0xf, 0x125f, 0x2, 0x19, 0x0, 0x33, 0x3a, 0x2a, 0x23, 0x36, 0xd], 0x1, 0xa104, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0x2, 0xa, [0x12, 0x12, 0x1f, 0x3a, 0x2d, 0x21, 0x23, 0xd, 0x7, 0x22, 0x2e, 0x17, 0x32, 0x15, 0x1d, 0x20], 0x3, 0x4, 0x9}}}, {{@ip={@remote, @broadcast, 0xff000000, 0xff, 'veth1_to_hsr\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0xd, 0x1, 0x2}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x820, 0x800}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x5, 0x2, "ac952ce40fedbd69675fcf511b8ab4bc4b41dc0e43bba38d162f89cea64e"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x420) syz_execute_func(0xffffffffffffffff) 16:30:48 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:48 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:48 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x300000000000000}, 0x0) 16:30:48 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}}, 0x80, 0x0}, 0x20008844) r0 = perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x80100, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffff7f, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x7f, 0x2, 0x4, 0x0, 0x2, 0x5, 0xdb, 0x5f1, 0x0, 0xffffffffffffff6b, 0x4, @perf_config_ext={0x40, 0x5}, 0x0, 0x0, 0x4, 0x4, 0x21c, 0x0, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x101) 16:30:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0xffffffffffffffff) 16:30:49 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000280)={0x3ff, 0x5, 0xcb7, 0x1, &(0x7f0000000140)=[{}, {}, {}, {}, {}]}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000380)={0x0, 0x7, 0x1ff, 0x1}) 16:30:49 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x400000000000000}, 0x0) 16:30:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0xffffffffffffffff) 16:30:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:49 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:30:49 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xa00000000000000}, 0x0) 16:30:49 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) 16:30:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0xffffffffffffffff) 16:30:49 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xe00000000000000}, 0x0) 16:30:49 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000140)=0x700) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 16:30:49 executing program 0: r0 = socket$inet(0x10, 0x800000005, 0xc) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x2, 0x3, 0x5, 0x679dd075, "79aba094a3425d1fa4198ca901584b68fd10687ff26aaa234a6bce70870cea53de0c256df6df2dd213c13af09bea8fd699dd00afcf9633479c4ab355ed5779", 0x1f}, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)="760c04adf67e4f290c86bee22e8df78365cbeaaa6e4621cfa334ee795bb281c11591876b68d265af1382cc3fdace84bb8048cc8b538b88d61f616182805d6c8b5c78cb1388020b231fec73a50dcf9c3da130608264682e19af2cc41c25967b10e360d7d1bea9a8bf494e567b41fbd07454d797646841462adba1ba44c57e99580e34289c80e62c74cf7c710128322f2f56cea6e89c8d685e453a5a20ad4ef7631f1775b734787cd702473e223e90003439335cbeb08b621e610926d0337d", 0xbe}, {&(0x7f0000000280)="8c566069c470e81ab791ac3948ff28772dad23de1c6ee9d8eaacba10beb002f831e04cb411f002ba0062ebaf9f4844be509ae9e2923dbd869e5f61e3a2b06a2445106da3bc5c539c259c14d2a9387d774cfaaf5f619645439521e41d70f56b28745a43821851de4097ada91b0ffb422fab42c9ff8e3d834e029787e9d9bb40ffe2d76db3663ed43ccc40bab3e8037162e3919e1e2735", 0x96}, {&(0x7f0000000340)="9098fec9e09a331c27811b494f6aef044457c4e0bb90eb387498455e57b764dadc978c2c1193b68974a5a31a2a25370f801c4ec849b87317b0b134313636241009d3b682cedcd4c4c2b444b479da543a106d5b0d445b3686c48c7473bd072fdfd838b023ffedfe1096b56e7b23ebc9978730ca4a3c9a7aca362fefb585e5b9a0e832f1bbfaf07cdba813f2a0949501aa966de7350cba856520a5661da48add84232c6fcfa7bfec4fd73439f95fca89f04d26ecc599e13beb788a18", 0xbb}, {&(0x7f0000000100)}], 0x4}, 0x4880) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:49 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:30:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:49 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xf00000000000000}, 0x0) 16:30:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:49 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0xffffffffffffffff) 16:30:49 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x8000) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:49 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x3f00000000000000}, 0x0) 16:30:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:49 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x80000000}, &(0x7f0000000180)=0x8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340)=0x1, 0x4) setsockopt$inet_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000300)="bde5039178676ccb461e85c58597edb2984b38078e10a2f983414e7412ff6b8dd27e1dd291aa864c748167bab7dc5eefcd", 0x31) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e21, @loopback}}, [0xf262, 0xb7, 0x7f, 0x401, 0xfffffffffffffff7, 0x6, 0xffff, 0x100, 0xfff, 0x200, 0x2, 0x1, 0x0, 0x0, 0xd8]}, &(0x7f00000002c0)=0x100) 16:30:49 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0xffffffffffffffff) 16:30:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:49 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x4000000000000000}, 0x0) 16:30:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:49 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xe91, 0x2000) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0xfffffffffffffffb, 0x4) 16:30:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:50 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:50 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000140)) memfd_create(&(0x7f00000002c0)='\\bdev:\x00', 0x1) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x50040) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@remote, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000040)=0xe8) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) setreuid(0x0, 0xffffffffffffffff) 16:30:50 executing program 3: ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000100)="409580bd9e33c4f42b5f0c7d0279b2a4ac99501d82f0e42fded7fb560faadcec4a58eb89c4022fbd71af2ded32024c6972d6b6c4c988161e542b276cd46869a240aa1d7d8bc520bbec76a8c843a16f3c141a0b261b59f58b8e76705e053c2f3fe2ae1051ff81e3c458a001dd4491b5ad473ab3610ee07fb70e126ae42e3193cf400cb347961d28df5a88334c46dd1d47fdea3d55c9d7e1523629ebd7f189bc592c97ced52f1775764cee97f809ae4cc9a499c7562cd9fc20ee", 0xb9) fchmod(0xffffffffffffffff, 0x4) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x81, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={r1, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e21, 0xcf2b, @dev={0xfe, 0x80, [], 0x26}, 0xe8}], 0x2c) fdatasync(0xffffffffffffffff) syz_execute_func(&(0x7f00000003c0)="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") ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000200)=0x1) 16:30:50 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x6000000000000000}, 0x0) 16:30:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:30:50 executing program 1: setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:50 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:30:50 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x9effffff00000000}, 0x0) 16:30:50 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x600000) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x4, 0x1, 0x4, 0x0, {0xa, 0x4e24, 0x7ff, @dev={0xfe, 0x80, [], 0xf}, 0x2}}}, 0x3a) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:30:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:50 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xb709000000000000}, 0x0) 16:30:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:30:50 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x789bb9bc0531c6f}, 0x0) 16:30:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(0x0, 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 16:30:50 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x3cc) 16:30:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) r1 = open(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x8a) epoll_create(0x3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x4001, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f00000002c0), &(0x7f0000000300)=0xc) syz_execute_func(&(0x7f0000000000)="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") 16:30:51 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 16:30:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:30:51 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:51 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:51 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000001c0)=""/205) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000002c0)=""/163) [ 726.577943][T32486] Unknown ioctl -2145893056 16:30:51 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 726.600845][T32486] Unknown ioctl -2143271673 [ 726.617798][T32492] Unknown ioctl -2145893056 16:30:51 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:30:51 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 726.644877][T32492] Unknown ioctl -2143271673 16:30:51 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:51 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:51 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1098d98880fab1f13461dac6f40bf1f0b09cb590ff41e3a4a8b649dfb7058b9fbfc8e85f2f8503d96f7ce3e5f5c1f22590f8a91d1949f9b8b22ba0a2b07256aa2cc8541053ca7fa0895f7c9aabec7961b9908b7d050d1248eef90dc7fbe882f82dd6efd2f2016c430b6d6077a00e1ae46a9d4c558db709da3ea275e61b82a1ab53a40af45ba9f57cc8433d6b6a16cefe6f28f5dd0a18beadfae340a9e1c389d71d1122986688f6", 0xa7, 0x0, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) 16:30:52 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") accept4$unix(r0, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$KDENABIO(r0, 0x4b36) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={&(0x7f0000000140)=[0x6936d18c, 0x7f, 0x3], 0x3, 0x400, 0x6, 0x3, 0x7, 0x0, {0xd78, 0x8, 0x3ff00, 0x1, 0x7fff, 0x9, 0x10001, 0x5, 0x1, 0x3, 0x2cdce6e9, 0x7, 0x14d, 0x8e, "2d995c8156cd15ddbc4ab3722adff989884eb6ec63cdd5c335f0dcfb11a6f3df"}}) 16:30:52 executing program 5: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0xffffffffffffffff) 16:30:52 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:52 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:30:52 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xffffffff00000000}, 0x0) 16:30:52 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)={0x3d, 0x6f, 0x2, {0x4, [{0xa8d2088f00d6bfce, 0x2, 0x8}, {0x30, 0x0, 0x6}, {0x10, 0x2, 0x3}, {0x80, 0x1, 0x8}]}}, 0x3d) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:52 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) 16:30:52 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:52 executing program 5: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0xffffffffffffffff) 16:30:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x8, &(0x7f0000001340)=[{&(0x7f0000000080)="a18115729d7898bce2eac8", 0xb, 0x3}, {&(0x7f0000000100)="f0baa978bb774b66df80ff79a2", 0xd, 0x9}, {&(0x7f0000000140), 0x0, 0x9}, {&(0x7f0000000180)="f8981021250f32d718f207dbb42916d062249945313facbe19615a85718adb852c8d6679892584a8f94c8191c572c6c909ceeb6dee5cd47ea2180a88f120065dbf860b838e670dfc4624a90f8e3c0e0644f3b5e5ea60fe744e506a859573da559f87a6671422f7eceaf795b31c47f9c451c896efdbf0ce994ba00556e5dfd701462469a39b7796c5e055f7b557c77d1531cf469b68884ba3432cc620e7bc8cb95862f50a271530ae9733be22391449e7f77318127e41781bc17c77a8225b6293d84c72ea501cc34433f2e239252624acb65cdab6913c9108c4fde9d1ca9337c814b109e529", 0xe5, 0x19e40}, {&(0x7f0000000280)="4d1b9f1b0d319e4d2172c02a1ee50b9e386b33747928c5939f58261e79e9be0a8991ba3f3f592c90ca1da87e649b6c7a8eedee5684", 0x35, 0x4}, {&(0x7f00000002c0)="1c7755e7e51ef1f68f3297f0e8458f59c15b48c237a4da3fe15d41c1ad866b00", 0x20, 0x9d}, {&(0x7f0000000300)="1e16d685c71ef6aabeb0b29797c0da4609f3f11693a8f1ff89a9530e", 0x1c, 0x81}, {&(0x7f0000000340)="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", 0x1000, 0x80000001}], 0x20000, &(0x7f0000001640)=ANY=[@ANYBLOB="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"]) r0 = socket$inet(0x10, 0x8, 0x8) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) socket$packet(0x11, 0x3, 0x300) getresgid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)=0x0) mount$9p_xen(&(0x7f0000000140)='btrfs\x00', &(0x7f0000001400)='./file0\x00', &(0x7f0000001440)='9p\x00', 0x1, &(0x7f0000001540)={'trans=xen,', {[{@msize={'msize', 0x3d, 0x8}}, {@access_user='access=user'}, {@posixacl='posixacl'}, {@dfltgid={'dfltgid', 0x3d, r1}}], [{@obj_role={'obj_role', 0x3d, 'btrfs\x00'}}]}}) 16:30:52 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) 16:30:52 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x2}, 0x0) 16:30:52 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000140)={0x6, 0xb}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x201, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x800) syz_execute_func(&(0x7f0000000900)="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") 16:30:52 executing program 5: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0xffffffffffffffff) 16:30:52 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:52 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x9}], 0x1, 0x0, 0x237}, 0x20000080) 16:30:52 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) 16:30:52 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x3}, 0x0) 16:30:52 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) r1 = open(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x8a) epoll_create(0x3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x4001, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f00000002c0), &(0x7f0000000300)=0xc) syz_execute_func(&(0x7f0000000000)="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") 16:30:52 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x604b, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000040)={0x1000, 0x3, 0x7, 0x3a, 0x9e9, 0x4, 0x8}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x50040, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f00000001c0)="bd57d79d1213cdb28b998d56a8c7a1ffb725b27760bc9f00bf65e78f99ddd71c27e8e82918f91ee81a84fce0b2960034bafc9d190a3747bf32070786ef207f1775c612730f88b083865d0ee207875ddc3cb118eb95ee26922fac717b49df17722ef2ffe56770ef0555b1e8a1398c6fb1355a6834ffb52ef866301809f51530e1897e4afbe022fdabf76be5b3814fa6dac39659320cd557ddd674d4bd9377b8fa542b7dc466a16dee44fa8291915e23669a5d005058b583d45d1aa2eb6369386991c28b42d7c5269afd32", 0xca) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:52 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:52 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000180)=0x2) 16:30:52 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) 16:30:52 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x4}, 0x0) 16:30:52 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000100)) 16:30:52 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:52 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:30:52 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xa}, 0x0) 16:30:52 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r2, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000001b9, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r3 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0xa03) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 16:30:52 executing program 3: r0 = syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x5, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000240)={0x8, 0xe5, 0x7}) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000280)="5ff7ef247fced5f60f417762afc79d6370329acd0b0f694eb91dc9ebaba7d1d401e4b48c0cbde20b03db6471f334c4a6a2ccf62bfc4550a7a1ca4699dc017c358f676a13b36625e287f049265152c9ba1279b5c252c1ebd82386865619a3af4072c582969d8d8bcba6e2d84fbc328e7197a6baf937acde4f81de189f0a6fcf317a29081a2940bf02829e", 0x8a}, {&(0x7f0000000340)="d28f3b14cc7678d9ce72eaae68438527ca97072794f80322cd6a1f725a", 0x1d}, {&(0x7f0000000380)="d16fc21c1446f2c0f5aa7e3f0b8183c44be8641ae286d460d9efdabc0c9f622d3872642f76dde1d11de909685b07a6888bff15e75516a1d0d3b62c98a0ab1f64c9a6f7a20031d65c6f697967d5a156a21f45261fb92db67769cc74372a7f3acc3edae1d34af15ae505899ff8cad20f95fae86e1a6e381971f36dae56a428f6b2f838a5fe9e52d777f337ad81dadeb96a0bdba02663ffbb02f33b0c2cb3fdf5d499e69d4f7ec365e066bbb1690f50d62e2c1494e16d", 0xb5}, {&(0x7f0000000440)="6dc9037782e4c854588699", 0xb}, {&(0x7f0000000480)="d6e131a65ec218f49807d45fb5ccf17ea9b4eeb7b96977abf2e5869d363226fd9755590e79dcdda77106af8cea967007a36c8e0e959358f65eec0536d25a7a60aa7d274db89e360dfbf353767db5bcf2b0a51573834db12a4592d74fd070077269120c8d78bb2ee0be7f3e6d45511f01f56757fe7c88b891f4427e0da12ed5ecc1ac32470fe3458fa92ad541b773dc4356158236b2f0702b99d1af8a227983d780f211", 0xa3}], 0x5) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000600)="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") lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r2, 0x4, 0x9}, &(0x7f0000000100)=0x8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000740)) 16:30:53 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) r1 = open(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x8a) epoll_create(0x3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x4001, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f00000002c0), &(0x7f0000000300)=0xc) syz_execute_func(&(0x7f0000000000)="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") 16:30:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:53 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:30:53 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xe}, 0x0) 16:30:53 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="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") ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000140)={0x401, 0x4}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x2100) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000240)="7b0182c31c7bef05965883b01187f361bc2d9e9d39b1fd7b3b966a2504f8c4d06a9e644b3259645866311b19ae0f029c45a998dc11fe3809f2f49b7685ca2d81c50d246fb6295d8365f562665135b56209c9f978219caad10e1017795efd910e798112c797dac3da41ace5cc3eb8bed985343527d90f8f1751ba6a1b39457a99975dcbbace044cbf0175bd71f4f0e4b914a405ff573759e2eb5d4e49f87fc1fe120a7426d884a844b7072adef960e8d3290e746f798905691d135a0eaa178d91ae16b21d4442923f034600be") 16:30:53 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:30:53 executing program 2: mkdir(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:53 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xf}, 0x0) 16:30:53 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x188}], 0x1}, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000100)={0x7, 0x2, 0x4, 0x10, {}, {0x5, 0xf, 0x7f, 0x81, 0x61, 0x4, "28adba0e"}, 0x1ad, 0x0, @userptr=0x7, 0x4}) 16:30:53 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") r1 = shmget(0x0, 0x3000, 0x8, &(0x7f0000ffa000/0x3000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x3000) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000180)={0x0, 0x3831354f, 0x1, @stepwise={0x9391, 0x8001, 0x2, 0x4, 0x7, 0xe5b0000}}) 16:30:53 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x6480, 0x0) getsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000040), &(0x7f0000000100)=0x4) r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:53 executing program 2: mkdir(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:54 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) r1 = open(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x8a) epoll_create(0x3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x4001, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f00000002c0), &(0x7f0000000300)=0xc) syz_execute_func(&(0x7f0000000000)="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") 16:30:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:54 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x60}, 0x0) 16:30:54 executing program 2: mkdir(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:54 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0x200000000000000e) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0xfc9b}], 0x1, 0x0, 0x20a}, 0x0) 16:30:54 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x10101, 0x0) syz_execute_func(&(0x7f0000000000)="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") ioctl$TIOCSIG(r0, 0x40045436, 0x35) 16:30:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:54 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xf0}, 0x0) 16:30:54 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:54 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000000)=0x3) 16:30:54 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="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") 16:30:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0xee00) setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:55 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x300}, 0x0) 16:30:55 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) 16:30:55 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) open(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x8a) epoll_create(0x3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x4001, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:55 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080), 0x2dd}, 0x40) 16:30:55 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000040)) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) 16:30:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) 16:30:55 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x9b7}, 0x0) 16:30:55 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:55 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:55 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/autofs\x00', 0x8000, 0x0) connect$tipc(r0, &(0x7f0000000f80)=@name={0x1e, 0x2, 0x3, {{0x1, 0x4}, 0x4}}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'fpu(cbc(cipher_null-generic))\x00'}, 0x58) syz_execute_func(&(0x7f0000000000)="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") syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x5, 0x100) r2 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x3000)=nil, 0x3000) shmdt(r2) 16:30:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) 16:30:55 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 16:30:55 executing program 0: r0 = socket$inet(0x10, 0x800000003, 0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000003e00)={0x0, 0xfffffffffffffffa, 0x30}, &(0x7f0000003e40)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003e80)={0x0, 0xffffffff, 0xffff, 0x1}, &(0x7f0000003ec0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000003f00)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000003f40)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000004200)={0x0, 0x200, 0x30}, &(0x7f0000004240)=0xc) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000004280)={0x0, 0xa5, "16353d3ef4baf975b519b10ad1fa8c757e2298e2bd72ed4aeb411c14343b93b34146eb0737a5b20df1b542e07a0a1c85d3a82fefd3f0c2a248d0dc51273182350edfac828a3fe9d69f5b2173a8d366431d91795df8770e56c0f01cf1a1e31e4991b0ebd52a4ece0ad6350d87cd927d9aa6fd44fe4d68ec7c19f886b5427fa18ebc426b5a910878de51a73fe419593e2e74f21f738e4d1cae1e26cde240912f2e768735b5b0"}, &(0x7f0000004340)=0xad) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000004500)={0x0, 0x4, 0x6}, &(0x7f0000004540)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000006e40)={0x0, 0xb6, "2e804eeaab9b0abf8e72ca56c9e81d0405727e7611c6d60d2bcab264913c775bb609f1dd30c2724b49cd2b1572605d308f21c6db2bdcb1b9ec5420ee779e94220789eb147cb768e8533a283a31a172e4fe92e3b870207d40350b6b88be730dbc9482438ad6d6492c0d62a94815489810c2073672959701942e35f069f056c7c7d5c87cc0b102acca9f64d4c172df4d231acd96629e94f2cd1017192d782c9f6213cdfc2e19ced27a53a012fbb83c1a177d7efdfad625"}, &(0x7f0000006f00)=0xbe) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000006f40)={0x0, 0xb, "2df47841467445505a3701"}, &(0x7f0000006f80)=0x13) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000006fc0)={0x0, 0x5}, &(0x7f0000007000)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000008480)={0x0, 0x1000, "4702d790f38c1db496d7b01e7f9d209860879138749644727bb9d4970365c641f695f3aa97eefe1b5a4c55a0565d26a81bbc8de8de890363dc032485d6c4c6087ea05b5f15eee8ce502fb718b7f25f5f15cccca85daa088b33f0f18aa069693c15416453f8d37def75fd60cb1ec6bddcd9e149cec5ca78d4f532dc2e7e9f135389ff7fbbb2db1a801b9cab4347a92444cf03f29b5318c5b1b6c3fd8963ee36003be1885b5863e0238c94fa8884d088b66971ab3b6b3f3e443a0316cd8dba7896037ecc9453c6d462e61bc5d8dbbaf3f31f0a4f0cc47f5aca65789e5a614fc45734f672057e571a4bd457ec38c79d3ac0a3ee2b23e65080ba5054ead9257cce6d1dea4683e85012cff8d65c313940564f68fc24561dc3ab427b2dc34854a6d5da06d1af477b25d748399b19119c2ec93d86e13f52c8ae5dff2f4699b28def800bf3fa729e327d88d8dc3e88d0ca6a824f5e6930b555cbc83d35daf9259599fd27ae58c014ed2a4e637f772a2fc51a65bd231dedeea4750ea2786fe967da685557265252ea1aab68f8e9f1e28095e304d420089db8fdc13f2dbc1432b7f78341ee237f729541ab4a6093ed280e4b73f56efc67a635ce4f371076a125bcb267072dd229e238b9dbf696f00d9d16f29e869aaf7a90c57fe1a7dd3228cc75eccdb7c37043939d8bb840796aafcd2182601cc032cff5b8121f7a4883162393af3694900914664369246b0a8375bf9d6d938097693b73c3f9d8ca4e0b9493e36ef73c76ce74149ad6a67b5db2f9fca09c8ac0b9de781ae95d0394189ab80125f4918e34904bf1b5a0e2e073a6a5ba3d0400ca3b5611d2de0488a6960012aa68226044ca5135f9244273805f14e6f878c2b6325eaf3f9035ab329cca1d540e2e958b5b5c5216c884dca39169efce0f40c501117013b43b30731e0f45fc0d77b9455cec83757b68b2a7e6908f5c732de9a956e357bbef27d03f4a367e508577c877b4af0aaf60ba9e084c3fad0dd76c44837043e10e1bf7a80232afebc8cd3c1bb605f1109a2e3542a19a61c379de6b131e111287c663dee7b5516af63d67393010b96058a2ba2a4e1cf24206dd7d9fa86438ecfd02b550d182a769a50e99424d57e629841635d0c789ce3bb06ad16c6e9d62ea5c801e80d8193070e1d550535ef060e2f5b0507e9941774e686f87f1c9c22e523222bc6fd806219c31c7907fdfb9d36ee8269c94bb2e17589e6d5c44e4a879b0adc6768c16e7eeb5fc8dd72e4d1e9791382f5e870b5b827bd6653665ab5c5ec9e23d926891323aa3c0b089809c30450c046b85536eaefcf6eb8485dd4124c7ab4aeca631bd7e6f23c6695599c383a77e91af7c0415fa8eadb6f57ab53ce2dd71d3289c4f5e1317eeb71df73e47acd8c76a33600512546b2a98ddab4dd1ffbad9121837e73304e0c71ed8ac9562976000350639f8209200b1fee3657585a306275dbf48f0f99d5303b9a8023a510f6c65bf26e5ee0aac793e59b3abaf34ebdd81d8fea6fb4fa831ac6dd93646593b54265ba014bb0c915aaadb91a372d5be0c2114c4a60991b9bcbfd27f931aa1ff57be5c478800d9fd712c1fa6872ded723a6ad72499608e93f86564330040b3dbe5ef7f21db1062bc634b67f58978cbd7df516fb04a48e40ef09b168e665c593deb925a2e2f47097313ad49666ac6859dfa8163163d6357f65493f7fe2fed00a26891fd80e5cb7431fece38ac62ce5b79b5052dd13fb1b0489758cb0a04a84ac83e39c3e9f0212b02a480de862c370348bd49da1e6f91793063b126a65464922deb3d4f8d80e98e199470249205963fb87ab7bc252e0a386ac97e01835b2ded3a5310d6be7ae6f845dc0111901547bec2534d74da1e8df13c5c650626efc6653addee1b0734e89ce909f4264b444a656b4ddcecbe7ffb715dfc50e743cbd3838f1f65c3cfeff42584fbc39d501e3c7ed9ec54c112985a838066173ab9e9d584d39cbf810df460e95dcfa9d036a06edd16c642709da1b42a932d4521b848e7682bb9d502c02fe48a5c5d590a9d7f2f1e878f1db5169d074e2b0f4475d9e54980580be3a7ffabf9926e4ff3005342139579521658730cfcb262e6fb5b10dbafedf20aee358c584b0d32c46dbe016faf05a99220775652825465a565316706c9674955c2b46071dd3f75264e35ab8395885ad9362af5bf3e68fd3d5ada7a2bc81ae6360b66382a4405c6187f737c399810caac2639730dd9f90f34941e08ce5cf49789bd81d5e030e15c66f542b174c1c62013ef0652ee67ec7db127ccd2e1a6e1c56b83e326b7a08d720efa344cb8507789b67d250bbfe9917987b56ba08b704bea3fab7ba600a207fcbec0cae5691ec0625474be270944081b093c82067df9aa323c22e28459ad45843e09d6c42a1ea6754cce99a8c9c09d461c2fd89eb7202f7546ec653e177604c0572febfd06d2bcbbc3e30741603a8c8bd4b3260094f6ef7b69d13733846fb916ae4ef0e588a687cc447a9f7fd43d59fdcedafc245dc9ecf03bec4fa69d5cf56813eecb9b2e8c6662cab8d9f2c3c8d493081d4c65988437f1ecd7b610c1346f67cc75063c488642d0ec64dda6eada8c9c1fe38a782583604e0370102a9539db9e90131a4a40d2a5b1e064dcf0665961440e8d9b971607efb15e637d873c7c8181edd5bad169205e5c7c27a81130ef0b56f0107d8f7aa58acb9a8d3c9ff2b82e6e7a984580e749329f38b4869a34f1de6361c5e7baacce589d506f7bf20fa62e120f2f88c651e265f80f28e1617fca0b42d5254ca198adaec6db109e899cef449909b980f7da36fa1cca07fefd989af76ad791e8d4d28aa6587a44f0fca24a975b35a4eac66f710cb6bdda6fd8e7af03e75bd00639cdf1d241a1463ace645e9ab756d9777b547c507c0ef003ecadec8704ad89c7b1e5afe4724571b884eb5637238608718f782efd8a07454bc30d749755622885e2eb35794dbe21f036f1f70d500adde5f9272a2cf36f7ac663acea9f8103c17a2114a81bfa7495c44dcda6cf889344381f2c9e62c9e788593dc5a47abedbc74fe59a83079568e360d25635b523d6648cb7278a6f36f2d3014978ecc8630398a014dcdbe1bc5db98966ca154e4559a4765b7b72ef6c8d56c26a5afc23df3adc02696d33a8d07bf24f98010d3d1a3c097205f20f376444001c5d722e68cb4e74590b67262139c845adfe9f9f97b62aa17751f392ecfbcd386bf940aa65a098b7ab67c019a448d89f5ec8862d3441f03195315874671f0f3bee038e01a5b6e72f772f9c84f29768742e1b63b1acde349886ce84a16aa7554db318bf78e10bd7ad09058568aa675c3f78d032c78a46a4520e0e887302bec75da1c4734bf5db2a060242c3141b68dfbe2063bfa152b36fce5da9ad7b0ae5b34e878816a23ad8a5e0a9d1a364904fa09e991a71340b4634e204976cdc53f3f945894aade2d2d50760dcb13a88d973a602fd9783548a58761de3e1e6828dc22039a9f0c02c5a5cd2f43b8c636b244dcf0addffe6db7d11b4f4ae6b8acc8f25f824037f870c642e2aba99edaa7cdad1f280a00e15a19ce36394f540559ac559ed4edfe1ef7e03f97b115b23204b303c6a492b7b9f6ebd75d0207efd4a2511b371b901de92916f09663cd32ddf063b432fadc58bf3d39aae6f6726526596a1bc9e6771c7b55b1c83701c6d58582afae5eb4649556256d416b0c1737877911e6741cb17607f35aee516aa8cdb005ab4a304012b05230d034bb4a28257bf14912a59e3abcd5046a6ff3c3780425892ee50576cd372de4dc6c1e1176f2100a1ef9794eb61a78e098a6e6fb9c4f0cde6291115ea7b7b42ba33dcb2ec5a04dc677c48ed6d65aa8123d58d1af13ff889017d0257e586779690b4eea00b14682bc6340cd62947a3a4609959d904da48ee9161f70858f759b53d303b92b771c1771ab3cda5f4ca18fade04a07b04a8d21c3656221377b5aaf73dc35d9df26dd7960fb8bd932db38577c34ef851d28aec30f2f68da5c05103ecd0acab13d941c53d166b7f434b0b38b95b9ee823c9728d7987d069024c6511674d124625e76e61eb4525c71e57408a00c8f76cce5c2933921cdaf607a0939e8eb3769f17abdbe54f6879c3dff305ba07c8c4ea7a2cd11edbb1abfa9e88fe0f7ffc25da98c30504e4c339439e0a8492ebbf599d6eea1df489ab084bd60dbc936e184f2ec17dc84d63cfa4f16eb7aeefc737965ee3b42f1d19f7d05b070ed0244bd3d6455c789aec7394e73050df6d9c19d0685ace49ddb7cdbb15d4aa7043b9d7afa7cd3cdd9c462442855b3d92a3a43c8712389b6f69ac4a508e5acfa38b4d6c84367bbd5fe58f54a9f8765cbc6776d652999652d97fd042ba5d87c8712c9961f5d403ecff3e15b8bf17eeb1a940d90f51fed665adc6ec4218e85effe35a21d9563e027c180ac7273ee1beb8e22d558f6b468d58810b8eac1c82901049d2dff9bd3dc88d4d597359a3d04bb0087f2630fdbddddcebd9baeb8baba971a57ef88da1773351a07e37b47d6e49610f4fb46a9b8095f7061b5e2edea92589e75fe7e9bfd50a5fe1639586a8124a16ee6d3bc91dfe66d94d58c9a71773a8f39abdd2fcca834a00650bef31aa212a3fb2dc216bf2d3137cdcbaf37f61e53e9c23514beadf9149713d6ade58bc53a9c00c17d2c2621e168700cd692c4e539b45b80de65f7064c424f6734613c6997bc7354d0c714212516cfd586f90d1ab505be234fe068a403aa26642aa9676c734b00f14d1fafa4eae07c7472ca619b71f47a903f516408c908ed66e3e07f6e58d52c9fc54ffdef6ba0725ea26fe7e61f4356e8d259253c8e380c558a19e64d915bdc3cf4aa347b58e9a183989654f31760b020c6bf6dca9d0b71eb116d1570aeff47ddd37542c8a9bfdc42ef7be85e67195c721b7017ce2a57d656707a454a6c77cc97260afe02ba4668815f5b1609e1aeaaa8dfbef40bc1611b432a83121db539cf954c49bc0b4fe76d283e7a0dda5bfb23ec15c1d90cc6cd682e09eb6b8a5834921b53d0a447d00348f32f48961072ab67ca085eb1190df93504e3038d040c252f4a7d41df5cf477954148d3de422a08a985a99e048876fc907eacc037801fc2fc87f4ecf6fe50e837f1d0f66ac4b72a4f4c8eb81a1c88b8ba30d6c6f2c75f4b2ea4d407c29782800f882b88f9550b531dd1769d9365ab41aecb43fd0f6f4bdb19de463772cea1abdff969b5cfceca286ea5d3040784aa28ed92df1497d3ee31f4bdb1cbcf4b30f7d7e0bf32eb9b509d34f9eb78e932f07b4078c5636a0439f53c31cb122470a3a2788f4142326e4b6114fa96b1eeda9b9f1bffc6e9881ab4f2369d0bdf9ac1e9902eb6f1e33ddca4cf81af2e26612f4069ef50938650f2606cf02f22cf79e26c373f2e10f7d60dd2f6ba9099efce04edde19724b89c9cab1e1924b869a2e9776a2cec1af647ac79335d10c6a49ea140cfac854346375f0e615266b9c68bb45b044b84fa692de9b69e1f81146a2e61b9564cee5d76ccb9550c7ebbc68a4e9fb8508c590c3abbc3c7bbadbfd0acb0e1ee9d1e743e967f281118ea7fea88abec88c6b1725c45107c4650a0e59bebeeb7668c80ffaa2d1123309db29bbb582b8f265269d605d40b019d858c2341f25c498541e5ecbc12e9134707d3cfa39d96844d362d9f2e8ad49895790de0e8ae04ea2b8bff7f299279fd3ca27ae19a4db2d47c44d12a4961becaf8b7512fd5c79aa27dd5b7b30140753ecdbfc9d552460ff1aef1cbcdedc8bd4b80bccdf1b9"}, &(0x7f00000094c0)=0x1008) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000009500)={0x0, 0x1}, &(0x7f0000009540)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000009640)=[{&(0x7f0000000000)=@in={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)="00b61bc00741e2a95631644f4820c06c4687cf9e7b15a842177641e440a1d4ea60060e3bd4e9a3d0936a1a57cc5f16e4f9e8a0b282c7496d5e151f677963", 0x3e}], 0x1, &(0x7f0000000140)=[@init={0x18, 0x84, 0x0, {0xc, 0x1f, 0x5, 0x5}}], 0x18, 0x10}, {&(0x7f00000001c0)=@in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x21}, 0x1a4c}, 0x1c, &(0x7f00000024c0)=[{&(0x7f0000000200)="120dbc6d2b1c077bd22d6c5f679a4345f6a7fb425a78f7588cc6fc261b9ba25360169bbee8f67f6a4cf29c8c4d8be306d8757d74efd7bc6f4a2867e8ea695459bc751bd4367d1241d45dddcf60accd24fbba807e4dd4ab85507e34fcf5195680403cb65cf3bee130cdecbc01dd1dfaed6a27249997cc75bd356487d538d20453ccadd9fd7b637d2defad2c1d8880fb4920acd87d26d765efb572173cd1e47b35b4f06374f08037b7b49599f63537e26c428194f1b9a44ac28686303d3eac13beb892a80c7c28f00d0c592f8a462c13aedbacfe0cd6933542377f338d4f7dd917f2fc4aee913212042af714f098d5965f64abd6e11a19b9c99b93abe3462abb880e07963a453049090c64cb3ef61fd7176ad09c32815491f225bedfdd763b5bd9792035bd1fca4fdf4d44cddd8573c02efc1ff4deaaac6720a051a1c650f607641dbf0d83353a03062db6d00c31eb6b451c6057da6236578c218461a782c72bceff9931913ee702d4d416f7d90b05eca8e207766c1cb084709e74b3c80fc47abe189f1b76e60d4150b1e1234717a65e6c6ea65a358f30b454057148c8d816d8c0496fbea365f6bf6bcffb0de3154d771f22b39095304468e7aa7f5081c7f59e4cb0e4ac8935f1163552c156accc51cd2a2f905037a37901434642431ac0c9ceb00143eafec2f2533c83192889bfb3cd2238b369907661d18d1ad33a2c67dabad600399537e728548eb33f643f4e608288e824eb9022e6e3ccd155d229541586517b0e4e3f1c1df0978d2c4ffa749992f84b1924caa7773a388fb3e71ff584b7a45b7e145f1cf9a1863df46f49e0358f1a69d4d12efd2cc87284b51d3c3897897e52d9ce83f66ab229ba8de4c941c60d2176fbdb8c0a36408e9bd13d1275ad584cbf7ec65f629b1ad0633b000153f3cb533495130a4da27d8b7919c90db16c001ae28a7a90b3a17289b1e240a975a63bd37bc9ed0c78107b0fe903f702fd6ccdb85bd80f8453127435d366812e9ec2e30974d57d4455abae4b9ad9978e7fd1a59ad7088dcc9b21a6f1f1735fcc9abb12ee5ddac010d628e109af9b55fa6d3ae982139c275a10ad198622b4c96f644a47fc57942a4fdc32eada14e37da2eb611f3b1b903168b912f3f02500e0195668c362fe791b24d2515f2817c0ba9e784db184f59508b6fdb97c6430a4a480f58be41c4f32602f78d6c33c19e8d7b6749cbe9d21ff0e175f4736d4d74ff4145b0faff34eef0b4fd8875dd7e79a6b5b049da08642abb8fb565a158ed269aec28535db546cb35d710bc9bbbb21040151f75a58e8124119494550a8aa424926fbf81db11c7b3964ddc70a2e930e1389c371a0753b6cad5b2cf47be55026e0dc0307e914b0c0d2452c34d78312aa872e91f31980fba88f4b635196fb602cbd21ae35de3e1440323d1dfd4f75ab62393b38e3727c5b5e1c7e26079594b005bc7f6a47e55a0b35a331589e7995c305733591650396f7e0041d6040f2683c9c6a9049f4b98c4fcb6cc8d4e1ba563a32681ba0e22418c5a6e878dd17268ee341404a7952456fea385e267e18ce4796376bd00b5baf62e455e56a4757cd64767c7e272517f624a6c20d8f31fd4213072aaa794929e2612b029c2e276dc91feb033795dff49695eba0677660729092a542ba88a4473dd937d381137a6bac50f9b0914ee1878775c1bce46f16750dc32d6060855e93819b04f64abd5b477933e821f2dccb8a7ec2eb36483966623509812163f352b06036d32f8631a8c84fa7e64dab888284be6db491bc999906ce227479f6cbd21b35f9209fbbc2f0be6fd8278da3e3b1df1f46f7254b29f73682a57db4fdbe7cd7159db5e44527856a12ae692a86a2d453480c0acc5e48730bee3e021633f9101b99536357593864f687ab48ad9235b55bf41376a066f94e06f9303e7f963ab7b43bc883875fb8372c31546a4b01da3556a2abb9797f34467a42a8795af920138737324037f3754844f13338070ac3cfb1ed455fa41dc10079cdf137acbdd50d2ca61b8a80a81e731aeef5c349e63b7e302b59296933b08b502ee869e28748c27e452497c1cbfcce5eabe29b7c5474e16e4275eaf3019a95e2a5511b838c4de1682a040597ef4490c078c3dcead02679878cb5a3878cf73c71840bc9ea4ffc80dcdca67ff5aa05dfeaaf7864be9ff1c3efcd52745a04988afaed02e73a17675452545ab2a481781d721cd3cb5e9000c666ebc65d8829725c5cee2559f1591795eed443b49918c29909074f6bc037e22eee59ad9495957635b46b330e81e9cb1928d84f71921f8c00e49aaa35fafe01829c0e47fe27b9b857b0c2f55add80934038ec9a8cbd97e07539e27e44e3ea4315cc1386fdac00c857039b2c66a122aba5f3c9b3eb471dfbd82708b03277f63727539c9153e8a726364161852d2e1af2962d9210af0fd47b0859b4a464e809ad5fb9a3ece7a451fcfa1171b30c45f69d9ec4cf6d78862129075e02905552186b4278fe15a56c0d4fb721531d059773746db661c488249a0662e8c17dbb5b38318307519e636465c17aedaedcd8c444fe84458ad148be175fe0042ed623d916e3f1d2144091fbdee7da537c9ef52f51e2b1269cbff6e3b9d13aab04d4730479db9c545b88d57033b2c8672b7bc9618b0afd64e77a4c4f588635a48d92c1b2649aaa386ecf75bdbb16c38389185e33b97bd8983ac32c434f3e23695f2b20e08054e78944f667ea050aeb6477e59578ddfb5eae1f77de57e465bedeaee3daf8d6d80799063f5451416b02d257462fc9b2adeb631b2018b3a1de526896cbd02e094f4839d94b892f441af64a012dff5e091c3596ebe324db1a9a41eb44a9bb1708c54f8b092e12964822a2d4503a3c13272598e99388964d8a8069a6161667ecd3f1a499108b2ebcd5265790d12b5f42a3fbafc92ce95f2e60332026cf49592d39256cc7ba74c44a58ad4286564959b027f74b1cd719d781406ea752165989c555ca6a3ddb404682dbf543beb6cdbfc200fab879fadb7e8076129c77df903a69534ff9cab65cd450e8e38122a774cdd919b9ecfe932174f635d988e0565576ef3380e1c45e974b56b6ab9b118fb81d79f81542bbccf9907fac9e13f2b3e2a6cd5a0ceab85cb40c73cd1a192a12bc65c3c4ef01dfe978d273de41509d7c8d412ecb354af9ab1947d16bf88e155df0a951c1498834d36609200fb953d8c94511e9a11ee9481de98f25a4719ddc18aa4bdec3aeb9183ff4762f922149ab8482b1324a4f79357ae7713d74c1c2cb2c434481de691f37a9bf9b0237dd7f0b35361469f002b452b6148db02b5a4491d9dc8e4fcbd7e93b3533fbe673600c4416ab9c711b696f49317c86e4d0f78ffa701cf0fc3ac281cc016465e1893ede053b7228f7f384010a175e3fe341f0004b54b8557e67d894849cff1becb0c9e7aff8cb4de3bc0b8b013f241d53dd0f2c057e4c84c7d2e4a67e83547b0528f0579fe503bc965594699d43a26ac33175063f6e7c4431d75870d133a90465fa03bea6bdd36fca5e6e2870af5e358d89a2c5d9b5dac0faa9a3ce84bdd75d96108f62ee407ed029a5a8d2cd2b3b500e2afb1ecabe5ebdefe5ffcd08bffb40748a63504cbff2a321b6ca48c0589346b79b94f3a1f1b44c64e036b39555939a131bc7295897fc714ed127a3f88232efdf1c2d27803934941d862599a035daefa74a6c46893b94f497151a63f26a47c9440916345c7e53bec497b45203d2c8c910653a9ea610d708c3eddf5c92582f203a07e0cfaf319bb5cbf3a34d2ef3778da0176117cf94aee68ea3d39f4ff96149739af24f3df9527b74db0727631b16a55dc28462425e0811d9923c2282becad757fa6bae0e6ca4c5bd910d0e6479c122e0d6ceede6d0a9e59880d123272e08faec487b25651b8aac88834a6dbb9223556a6612831c2e2cc9f37a8b682c1c092d1342aba0f2a65ef7c93fe8649fc6bbbafdad3eeed2ad642b17fbcfb82abdcc6f0e8ea38d620824b56711b8aa31382b0725f9eb326f2e32e3179a2a2f5eae9c65060baadc8748414d33985a5c775e8c53fe996f06f1c64b1e353b6f6eb78ac5ff9319e8485e348672b746ce33a2e6e0775b6653c1b9df3086091311e9cdea44053ed12806cae95559e72d0c160552f331581887ec05e64504a5cea8f503428128b9fa5bf3f0ac23fdb2668d0fd582f547bdd4a73766e995c397de4b5159dfa1fb7655527fd25f4f044c9c140924e723ab6195d971ea80959cb942931826c3b8a563d1d619419e25274d701555bf2649f4aab62f2b1e31686e69940f4cace0af77327a93170268b3f49bd8210aeb81970e5504994b86f563f44d5ea986a741317fec73b47d5d4ef29602706ba1ebd3c13169114d4a4b3677ef13d63a2859906eb890c7bfc5e84aee2d8cbb68afed350c3375956e991d05196bf3dc6b2787b2af9b7ef9b73ac54f833a033508782eb3ca398af769340850d7a829818e8f8c362d9812f059f4b36e2c95663fc7a63f6085572105fa809dc65ba42b0ed105993841d24e85400726397b628acb68482bde3228732641e52e85a0bb13ccc97f791d4b3951d30803b5baa7595b4b304e2421a9b160b1f3f890a96813f22cf8a66153075eb3426488a3853561905c90c10b9d5158bcc5e8a6aef085b4cb2110644f2070bd8f9c066d2570acdd4a70bc7267c2860c39b7dcd6760a798c86d8faa4c9b559ee09c1b3a8b82bbb21865b6c0eff69631156ba609a4d06348a17d39392cff3cead79e536b365d5e300725e43f5ba7de6d91fa34bdbf41413e2a8182394cbf6632075213660407bfde3aadb400aed436dad48bce889e82a7b9b36d3ed3235fa23d8c82d85cc3d2d063fbae12cc0c8b73d5292fe22c923e651432f916f2554dcc58b63cce182c9de148f3c856a4964258b406cbe8c31cd7258b09ef93a20d2f0dec6425b6e9f19b4f85701e2006b665a94a79fa495c2e3e640b16d6c35fd396827e88388b7bde2e6034f41ff42fdf854855f763a2f696fe989db30385294048cc50a5318b9d952d1ee371a5830e5e644682d9136d46d56bb3443bb95c2155208befc628b37af35c50ec6299ae11f8bed61bb84e2339d284dc87464197392d1b70fc7e32dd3a239732d82fa2c2952b919e87964a91055e4ce434c9582aaf0d56af41853b2bb4d43a708afbbca220e166205b8240e6cbd55a3704a415462e84c1ec25920fd3a45d8dac07e0ba174d906f62c8cea1578d002b51c1a15f40a85513670ce1a51c30a131214ddff97405d5b610f3b21d165ff88e349086ca7acf2fb14c00a3923f8518051ad5ce6a67168d39d2a68bdab8f77f0f15c22d990718da294f2a797f99849300f7ba6f13412755ebfbf49ed7e0955843d8a2e5e1204dc363927d4e5b64255a3ea4c14a798807d7237b5383094fde75ff28c0104e4d8aa02327eb9019a3a8a27fe158f8fece4e737fcb91eae5584c7599dd801f221414373924b14fde86bd7235eae58d1f4db7f302210cb8dcbd38192be28f8a30b9178722ad677166a1635c590ac8ebd51f511b35c772dd030883157bd348f87b66eebc470510e7ad7b624e910c5f6a5ae626152b03019138197884b0d64d8529f3444ccd4a4a57221c8dea5e6b58f7959eac502370f9071652cb71f27f4bcf6222c0b53be81845c5832a57a85c6f4e3adb2993568c109c621ade17bfcede32fd4d9a663f676f2964277cda5f730160405503a45dfe684a5bac3bc2f8153aa38615a6751234a2215cf00d33399cdc7b3c95b6801c27a94", 0x1000}, {&(0x7f0000001200)="10c8fb9bea0ee1b9536d51fdf8949f34179b574a8ee404503e0497d91e5d975c1e7067af82fcc5ea1e4f5fe43da7661266ad5ced1a00351f3998f8f2c14f2c52dac0ad3ade902388df0cf52d63e346a5265380f54351d3f177bddb5768aeead86cf0fad468238066481a7159d9b907dfbef766835d2a69d5fad8262bd5f0ad75df72b185290f1941341961781346e723d0fc788f5f057bf1ee5db54d084e8276acace9334a122349c02ff75063422cb36f5f28d7b0871831426e5876a593c9168749ead007484696ffb8f8c2e206016785bb3c7af984a4ade09d8f8360070e137a82c112460b0e", 0xe7}, {&(0x7f0000001300)="b5ad01d569c5d7ce435f534278beb5c8605e6cf47bce88b67da1396e5fbb577dc1ccb3b78bc2686175588191804a8cf097b9bba324162509f87a241e5591f2d3f73e7118f6e08d2eec0ea1b70f3a49dd0fa8d2bbb1bb97a4388a4c2c04115573c0ccd7789282f5c40dc1e17711a1fb17", 0x70}, {&(0x7f0000001380)="f8e12d0419e082f927297ef3aa3c945902e974ff6b058a635408679e44d48f072e3dce395cd067767f6bad488d233b29be5c84983e200a571eea987157292d05df1a69b68e2471326b96f46418342d637365b83c3d5877f09c0735fc1c", 0x5d}, {&(0x7f0000001400)="94cb5e0a2c93b75e66f603f6b3bf67f07c4aedff980fe176b5aba7e8afe812d5", 0x20}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000002440)="fc66f977d948ed0eee3dd28f8d537894522b3f46c57c0e2c19f174373ec9b26b944872d14e23b9bd1772dadb7df207f1ccb24a8e0d3db6043512b034be5bfef557dad4b4640993d7f4c9aa90015d46e33a0f18c0f54326a65d26c6a6730fc2ceff98baa5618b1f8f6a31c7f5", 0x6c}], 0x7, 0x0, 0x0, 0x20004855}, {&(0x7f0000002540)=@in={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000003800)=[{&(0x7f0000002580)="9b37bd8084f03c03a0fdf0c6b48385fa73c8c908797d2b2fd6550b4dd507e2ce8a956add1fdaca9d7f142626d76e9cad5946c773fab159", 0x37}, {&(0x7f00000025c0)="0f107fb388cfb282b4fc1a46822d890fd65e076308c82b158c38fb8f31e2f8689657019e71f894990203f74c694d80bf697ca19cbaa5c0a7635cc3327f482e1c8da53ccf0d4161a15f3210cef333a2e704e4fc028c54533a9d6bc1fa56a1e8b9752810a7b2b31c", 0x67}, {&(0x7f0000002640)="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", 0x1000}, {&(0x7f0000003640)="96183f806fd8a247b247c72932e8fa3fd849fef3f3e9ab5aa078cf5c8b102c70af55ab1d8f05bb9ee8f0ed7396c632386c7cf52c3867d92149e76ec12818450096f0ce9fa00ecb5ec99526c112f18d685963e47db2d1ddd28ead52f637ca40e221c172dfe3c5f8", 0x67}, {&(0x7f00000036c0)="84cda85203708beed4273c810cd0a7bb3576a52281fd1f1ea042184b10ac7192e586326cb49d58b13ab56ef930a1192e0ce0f2524c1a0d9fde80f87d144b2c78c48c059dece6b5df972bc041a55735603af4c7848e5fa89e18d36b7f531fafbfa8dafacd1164200d4576280372577df20126854272da98719633b6030a530fd911f4f9c12acd719530652d153aeac6469965f4183cea5ef5a92869c1db52de6e247c3be986a37274e75890bd61", 0xad}, {&(0x7f0000003780)="65b2e7cbd7d9905489", 0x9}, {&(0x7f00000037c0)="86e96d636c6c40198f5fb966c2e2751f4eba96b54f8c10ca2c0f2aaca3f559210bf602fb5b4ac1be7d8e9c665948191ce389bf18b283d237a0f037763088", 0x3e}], 0x7, 0x0, 0x0, 0x20000000}, {&(0x7f0000003880)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000003d80)=[{&(0x7f00000038c0)}, {&(0x7f0000003900)="6e731438c7d17c8063f348e3ef0abcbe19cc3015b7b3f31f97f7b6094acb5dd8d37daca37eb4171c5d6fb453853a4e9902284eda4606ba4fd89f251c1835aa61b43759757d582a4b89d0db7f4a5f7d5ce76d02b8", 0x54}, {&(0x7f0000003980)="a511d5fe1aa9cff211ce2843d40ab57b52d73e9f2310d237d1510c", 0x1b}, {&(0x7f00000039c0)="e4f94903bb771067dc40eb76f903c633ab1bd0e37dbe005a29d710c2d58ddd7024d16e3808b93dc4c0d811f6121fe0b807551de7429ccbd66a93f209520ce66daabe86518202033c13721621c518e49d051505a0c472abb2e5a6b454ab5fafac15e53ed7d9f01bdffe0a61203c2c2614a6dce6c921bb6396d18741e46ccc77783a366a2372ad2498f8180dc34ef6aca0eba05456d0566e0fe03cb0eb35a54ca543c6a8b9cacc692dd7787de6311131aba7", 0xb1}, {&(0x7f0000003a80)="a6c315d2dff11eeac50b15fce29994ce2e4d86e1338d45d0cd6930fb07789a339d976293c6b9780a073aca006c2c52870bddac260595f30209eeffd8f7d15ebd5ce5aa8c3cb478443bdce12dbcf031c1d06e403d3fdf17c3a359aefb50c2794180cfc33cdfa1ccf113e6e97c1342479124221635ba63cbd84764ec860f3da4d9b85bd9ec8468b30cc4238401c64ccc45eab5f448c86cb9784bc4e67edf40f13c548c561216256710e3efe65533367a32b5fe5d71f87f0ca86ce74a0da1be0d", 0xbf}, {&(0x7f0000003b40)="42f94e22869d09c3cf98898e34778682b9d59f363a29b043a507cdc318ea62f89692fc65854ddcdd566606ad82ca751f1104c530c9c0b562b47651e7bb02dbd6c36c2932c33ea5afa0ce1101caabdc894dd4eb9275f12165fc4d731222969826cdcf926bca0e0dbdff2533ce423502c487b1d11a28eb1e3f019b7ced9045d0efcdb6e2c3aebf331fa5b3cb17695674652f76e91488f6f1de5a9544d94da17524f47b8bd9e240117da0b4b69f9b18679de8f8e74155", 0xb5}, {&(0x7f0000003c00)="6442a65ecc186ca46c75b2174b38da003d1ea2b44f79d8d304a8de9537db4f982d3a7c18240ae40ec6c78099bec60c3975cb772843adb465f33353029c6113aa229171031af7f1b55987490942e23549586ede0ff71561d67a02d25f1998bde97cd7eea67577135259246891408c3596b04fc554159aed6535aa0412864a66c07a5b7b0c4e463d20", 0x88}, {&(0x7f0000003cc0)="79847420640eca5c8fbf95f2f6b6c1768a53ff6acbc347aaf7caec673f1f1f5c2c76e1bd98de3683dd369444bdbec6e7a02f1805ba5debc58824138c70d468ed81055d916ae4456225a65a12391ca42f5faae0d165ca4d355dd70f1a89380f6708fe4e0207da3c2fd8a87ceefb062708d0a9afaa4279a82c51d339b0c930aeb25f4b5d3e1689d06ef9e6d7f518ca720ba61a5527dad835f00072ac5f825f415d56da72b731c5ea2aaed9", 0xaa}], 0x8, &(0x7f0000003f80)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x7, 0x8000, 0x9, 0x9, 0x2, 0x656, 0x9, r1}}, @init={0x18, 0x84, 0x0, {0x1, 0x1000, 0x23bc, 0x8}}, @init={0x18, 0x84, 0x0, {0x9, 0x10001, 0x800, 0x3}}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x1, 0x1, 0x10001, r2}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @sndrcv={0x30, 0x84, 0x1, {0x101, 0x9, 0x0, 0x8001, 0x6, 0x2, 0x1000, 0x3, r3}}, @authinfo={0x18, 0x84, 0x6, {0x661}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}], 0x100, 0x40}, {&(0x7f0000004080)=@in6={0xa, 0x4e23, 0x84ff, @loopback, 0x2}, 0x1c, &(0x7f00000041c0)=[{&(0x7f00000040c0)="8ea34c5957e6128ff84955e64dcb5012c70ac3774f4e196da0d7df89d96edfc16eec66290ad161657089142a233f38ab40cd95a0d101e3867d9e2b364ebc898440721bfcfdc18275e3a094a260bc76e97b685b48c5cf6ef3cf1cbb4fe917c5c6e78db8d46445cf1a76cb4d6ccd36145cde88b1aced30ba9e22dcd3b899573ab4d950bf807e992ec436c264fe95e5463f1153f34b5582a3c7457d5096228cbed6b265000f36b4fec28554cdb2b754cc70b79c70e78f8fbb04941f131c2b6220cd113dc6ecb31978e7971cd02af2", 0xcd}], 0x1, &(0x7f0000004380)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x88}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x401, 0x9, 0x7, 0x7f, 0x3ff, 0x0, 0x6, r4}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x6}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @sndrcv={0x30, 0x84, 0x1, {0x9a, 0x7, 0x8, 0xffffffffffffff9e, 0x1f, 0xe24b, 0x3, 0x1ff, r5}}], 0xa8, 0x4}, {&(0x7f0000004440)=@in={0x2, 0x4e20, @empty}, 0x10, &(0x7f00000044c0)=[{&(0x7f0000004480)="f0ab302ba8e61a6ac309d603d9cf6f3f3e4b74e84d26799e4752ac97fa15b8277b883fa62f1806df0ac50e61f31494dcfe34c824a107c839ae06323f89e8", 0x3e}], 0x1, &(0x7f0000004580)=[@dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @sndrcv={0x30, 0x84, 0x1, {0x40, 0xaf92, 0x1, 0x0, 0x1, 0x9, 0x400, 0x400, r6}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x1}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x8}}], 0x78, 0x10}, {&(0x7f0000004600)=@in={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000005b40)=[{&(0x7f0000004640)="49776e435bc28d26304d806bd0f67fe0a6744c2aa1c2708d473ca6e33d1a259773c2842a507aaedecdf453d294da12c50f22d785c9747333fdbbccbf3e3daaa71d3614a1ea60d67b9a52f72da0160517f1b944da7f554929abc635f37e9ee66c5d72bfb2f968e2b34a7f61c3ed84af7acabc6189c058fd022e7a81ffa4242d05aaf87dc7f1e9676cb071c4463c7b8dd85533947c18ac37129ca6271cf49d07572222f0e66810dde1463e5de80629f43be4068a9d7d605d930c9179ab290311a4ce77413d3a61371338ea34db242c02438d8d5b51e461fc", 0xd7}, {&(0x7f0000004740)="3c23d0a4ccd9627c863d8924ceb4082d1eecefc52b2dae", 0x17}, {&(0x7f0000004780)="89c55ac17a8f0f49af12bb12a3d56fcf10bed79344e1c605df41b06494bb64b92e9ddfa15b6ce133ac16e286184c26591b5704500752582cb7e649146a638527722156ff05fe7689e0748695504f0cae252496e6dcd1210fdccfb7089f95446a61da7cc71c7d7141bf5102da413f874fb1b462d1f63e44cf9a7ce3e4b9c55e3bccf2ef97f6ca20f0802ff0090bd2343fdb6797e21b88b8af739744a194f7152be617b64aac42a1f3bcc3b143880fa0cd9ade362f36525ed94f4783927fb84b2fd71340088a2c58c7ab0f00f715b376cadbc9d545e1330b18f27bb0a89fe32f69b9c2a1de4251f114e6e93b6337a222384f192a2011dee075d1", 0xf9}, {&(0x7f0000004880)="634ad7b68033b7cef72e33", 0xb}, {&(0x7f00000048c0)="3ae618ebc02821cdffc0eb2fd5a666169612be386748ce9f46685e84c8b8a46834ababc3b7662e3c1e3462d0750a87bf5eb113cd90049c5ac8d0b4c3cf91ae8750fc7922f5dc6c1caea83aa8985406b423a10baaaab1d4ae977d206c3240265fa7007f0ed8a02cef01ad159de941373e31a84f8e6929112142aa0d9c2181e9bf1356a63ef0afb57ad0bc8c4a9cb5ca92f5002ce357fdb34e9b959de748f7ed1e3e61d7a899008cbc92519da4704209c1daa2fdcdea1f23e308", 0xb9}, {&(0x7f0000004980)}, {&(0x7f00000049c0)="35b4e1053e6b4597b9c78b88ecf0464b5a89cab3763d3622d9cb04c06232af3d20815ba11cab2052202f524f07972d8f74c29097cb1e3ae4862bc7c738fbd513d92ef92e543140c65e15fe0d5417394e6bf51feda3883d887e610b5265daffaa78ba648a0075a1a906b37f529260ede4a7acc23807149cc8", 0x78}, {&(0x7f0000004a40)="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", 0x1000}, {&(0x7f0000005a40)="5461a434b5ef7fdd0a5f1b195491ec652b9cc56f6b7d96682c286380abbbf5de67c6b165af7a37498317329fc6e818c8c58e445639d7d36fb1538e304aa861ecf4deaab1334a55ddeafd0b7a69fc36799ed19f28105b962b078b78546cc547def4be9c8880a46b9b47ca5c42ac07d1ab0fba05dad2699cdb64f5dc4a8cc9dbf9ce165432b2c365580d7d74b4c8535a1c1d90bcd349456a79e9334d1762c91c91918948478efac11ce2ae080240ad5129ea2f57a2527cb8d0920041f5327356ee75fc55e541a386abe06b0dc1289e9d1eecd3b657fc4de72ca5e276209e658936838775ab2073c050ec006851", 0xec}], 0x9, &(0x7f0000005c00)=[@prinfo={0x18, 0x84, 0x5, {0x20, 0x5}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="dcae73da84ee7ef7ed6fdc6acb81c224"}, @authinfo={0x18, 0x84, 0x6, {0x8}}], 0x80, 0x20008800}, {&(0x7f0000005c80)=@in={0x2, 0x4e24, @rand_addr=0x8}, 0x10, &(0x7f0000006cc0)=[{&(0x7f0000005cc0)="43eef95b5f8fae49e5b4d1dcef9636a71dae558589106d977d9f89a57a2faa3de357503028dbbb2878dc2b8c0dbec9792f22e15aaf0bc448e205f4eaefe655f109909fe7ba1ec7895d0f0fd9d079d3099cd409fe5fa85478903a3340f90821ec087358c1887fa17c0982b8846bbb643df58ce818da86ce9b186b730cb3a25caa0220970c2b8b75f26d66074512786bfd72deb9ad186c0b06ea5968390d2f6c3f539e2c14570f24b05aea9270bc68f95b7e52b769a430a759d4a7f31c44f3a2599ce98524ee0aa38c3154d16158d9cd1f853199a45859500cd2b2ffcf0bda0c0274f9575ad2f23347516e2aa9c4c5e37548ce8c0dd07b3e6e99d4978b15893a1105bd234a3de872e8759c87682187d97aaf42638330302f4a543ba1bc5ab8011a6654d8ad78c63c1e84d1002dda301f2a1aeeb76c497d6ca88da379f0fb783c5fe25b4b44db5bc6b9274acba64f9e618d3b8da8d2868107df52239e532f0951a6784e27972ea950b6658418def22c5276caf371643bf27cd7f5a75457ac7c16fa69fd17606d464c167a0c2a10943446c7454aeaf34fd793469e7d210d20e4e208d8d6d396f8a536e7ffb96fbd6cbff2d297611ba0c920627ecd787b4f4405ad64d46786048106f9c3ea66313c63d2ee63757f978e272fb8f4b51b832903aa5685ef1832db998bcca7fb47ae54b44c7d93ad5564651bfb90d0663e41e000c012cba2eeb0032d6ee1c7a41c5b0c3736fdfb62f1be8b9cd48f9fa6226eabae42bb9178b77425ead9088b66048f6457376674f4ea4356a5653618895053c351b3fe5081f22f4f24c718605c17949664fc572f805f0dfc99006b297b13d28277ab56a57c34e9076135caed9423ff8dea66b06f55ced4b1a89b41cd55ee29920d9c6936cd1a239a3ff61af4b42034611675f5451d4a58c76c318f2f1b6ef719f7ea255058e532a5121760f056ad56f286f3ee7fdce2d5333e4c1ec62133f969c58dabfa45f022a4206b9c6c0185fce70aa843a3f0bc80608b4fa1112f5e72e5dec07cf1840c8cc21a9c21255bbd6196a26fa8c964a9c54a47a591b7006381bb83208bd131da69bc7540acebbbf9aefd48fa1c901e59585433d4c7b56e97399f00d98f9ae5e816ac964061c0f37884c7857c6141c3125bcc7f3be6db3d65d39a3e643adb6e4c451648d8ad8887b3f917883529471e0dffffcb6235b234f3a2a91f9f0e5ceda4aa4be50be9e1c5037cf30a512505e7dfb8193790801e2936e05a46ec8017c42d7c4c77e4bac69e561c03c32cc6842484876d17ac9ea8982d112fda53d5d7a1688f342233eab679e71446b7597861de01b8b8261af7b313f40186fcd89a67cd047903dc8f02834a3912eb95180375eeb7545e979c42921455dda86320a2aca1081deda6d7651b1e596e07192488c23b6f00db9aade2bfa37dca817b847780a0383fbdf07e8d91707021ed7b76f223324d7a33dcd8bf79633648f303f65ef0f8a45ed95b2c98b11ca0d39c72ef3c041a7d763edb4f3416dc77a18772db015159f6edf5574ce2e123ecb988e7bbf7e831d3b16011d8a913c6c994fad89a01cc36cf112d6eac29dace8f00d9e01d9a704eac30462075ab8f0434ae2b36c6e39ebd5b05a3f3401be623b89a3792ad607402078321b1aefd4316f2196eb7c17c487753d4ab34300dfbbf2cc3762c31835637af6528348e5c65ca4b6a8cf20efef495c80919eef0078bd71382ebecad47f035a1b5229e1e5d587274cc1f88ff4ed19011519455b291f7b248b6f41e5966c0f7f9cf891e3506818a157266f23f75e0a86d1413f3fb9e396df96f517569045462756b7e0a0e44aec46ad9e67a2671381355f29b9e7944c0fe5f1e529b46994fac7804e928fd3ec7108e85b15defe0c111a64091dafd7590d33e0d43f71aa466fa1f41359be803e345a4a83da8738c29c29a8f26a1bdc4640c75c7ddf5f42b1f258e24440236629871082f01b26fb77f586558c68681359e0788fb33a79807a7b0182885ded91b594bf752d89bcc88cfc1471dccfa5e3684f61009a2a3e0099b5576539f0d6ae241ef61d6e3153a8e71fae1fa4b341d702168463f74dd1813e6d44ee141aa6e0f31c1b76dc8d76cc40b1db2ee2d0658e4fcaf8e778f4c4f837256177f6841f45a2925c4789147f3310829872df2bc08ec7f689f5c29bf6aa054e260263a2deaaeb12d6e7f6b2910d0d158dc78480e0d928fe8d7566fff7e9c5ff067b38938e10b5816db0881733ef33a58ca66aac18e185d207f969ed6e5b11c301182da3fbdbd180d9ebf88c86e9a449e3add31b3287a7454669223b39b96bf773dcd6cfe6037279b5568cad353e423c484677f719ae77e3945a4a1f0ef74d1fccfa33415bb981215a9106d0fa9e9619d9d0e80d1c0ba3f45047f399493b4b9a272a72fa5a372fd4d8b0ae13ca5ac406a67a4c24c3744b1d1ef3bb600b0abdd1d2a281bc0e0ac74561671753ac0b6d041daf1d481c65433e95cefff7538e1c613a1d49fdb049bfbeec9fc2f51c997fbc62bc3b4994eef1955e83ba4c2ca4968b78eb06280186eb6cbd22c4f37bd5f361ceb7a152b357685c4b05a6b18710006730dfe16676b660503b4f6df6e4d502d7141fc093bc9d8bea1cdd026dadafeeb34285384e0c70fa37292e588dd4cc65a8a442575d6ddf62a117cf035f2ccc2fcb90ab8e840f8d73ede2e4d0d4a25d4a91469d86be543203587b9a804116da3919cc86e907cb061f80dbef70290d0b086773c617e328a4b6b5023ec0787b30fe381ded3aa69d4a4ffe3ed4228ac21bc7654319948ed69087f731468ffd568c4d2ce8eaba6f8aed0b6b901f0ed26b730034276f1ae9cf67eb4fd514a180d426867e96a5fcfae9d1f9f2a3c348bcbfe08a20d306ecefe1288920bf76ba0105b64ed7119cad11e7b8fdf7b2ccc50df503b4449b1d9e57ff13ad7fc0a470a674ba33484fe2c24833b66383d327832d8dd7d1eb8613a056f4b6715947b44422ef2bfa745f0aa3dfd96f3fd83195e171a0be22773621a108dcc477843cfbca4f37da0a8bab17e525f848f249990e81a46c39d1bd93252c6f5d387c016359d4c8ce685c411c8f3104cf09c36118f3b1b4205a8fb5b02732f1e950d8177a45ccde742ede098fa17a03bf0a3580a10abb57621f8ae1d5f0f86d2e348f8657511f6c342e033b3229e98a82490a3d4dcdf3c53b98b8857360e1d40e02d09fc5ea3e1dd9b892dd3e6aa076a3408945e0dbf59c2f6a30505f8ea319068dc65a4a975c91e7fb8aa15b5601371710fd61d15d8a845bd9bcf5416db1708632d60cfb6e2cc018a2d596e71cd9ac52c6590ee6e7f81cb1e1ce50e76d2adead86e50942d32ee6bbaa390bf8d0116090a4656de91aa960cc6ed85d208a4438bedb048e6bebe20e2637499b623c49b28fc82124a6f1ef36153b4bd9334c6a988d60a53d5f3fc018b46c91128d748b9325bd88b750c140c99dc13f6060dd12fda25af3d03e2b616f541f0dc23ae8753f72e3880145c2c3a1aae9c7825bd6fed7d321bb4d5fa469e81391eb2b8d647507eaa222726b3825b1b98ecf59d8b8e83dbc95a185d7ce0f0a9f74a2751c5c68acea1d83ac7f36033b28d21016a3464dd92b6a058b74a14460dd1da25e3d8a254063468c053e6d222eadbf60ddcaefd4d7d7af083eb8515ae100a8f6a5e00bcd3c6d91ae661bfa40984318e70cf60206a9044e162e238878cc3338606506e45814b0a77998cc9b8feed735db0c02d5bff28929d524d4932baf170b35f9f9dd9c3bf1bcc2b75b20f9e711ea7bd4b9009438c63d37f1d9279853f058738bbbf594ae5ef0e48864e25d5de0864827363dcb80599706d06b94f42fe598359e7b14acfc5cd22325762f9d022d868633e3ebe14203fa67c4fd00020b8ba565729a310cf720c56b445be148c611f54f7e40b9c3c23066a385cc3ff0e41a05dfebe909cdb7477006ca7989822f551f2a52ac5f4e520db234fde24c148769f6ebafb81d4a0cd350eab6963008a68067ff884f35f75374e2dcd3564dc9665ca0ea92f7a46a6710e1dc55fcac169679c93e7a06c1efcb4f3e3164405a181a40d5f615779688a9f98d83f6fa191498367388bfe3a9fd6e9286f1c430192d77ea51d72652141cd703868ba6826f277788c3f08757bb4e227ec7b9be2577f10299f77162e182ace6ff1f3c1ee9c1344a45bea96af8e6d4422533fa275b93c908f8198240f7479e6c24cf04ffeb14f5b09ecdf55618cf5d6bc751608f01582dc3396711f8702d9e711a252f1eb6ec462746c78ea8bf04d98a57d602ba741bfa0d22b307dcf2dc4cf98fc91df4470d098eb5597630b8fbf770023b5044e5eaf8e64e62e1654b118ec13595c38ab0b5fdbf6131793776a6f51d2e8eae4a6af0181c387b838cecb43dd1f59765381b8bff82e51c0ab35befe2270cc267b423fba6b60b2c4e5ac67f7ec9e8c2eaa09a538530fc60ec995bc57fa403ff1908a84e89e1b5e8c1c64a18ea50b51e8c20315247cb274b2fa21636ebe4761bc53407dd4028208f79d09324f7bbb41d3dd5b86600442b71046764f82ba135054d6f97529d6772a613a05f50fb94e9aeccb6b2eb72904ec3259526b74a2785f9e3e99306c41ccbc4c7ef33b4fb4f189a18bbbffb3f4fadb53bcaf9146654ae4226f8364f30367fba533a9e43a3287b3c5e779cd179ea837aea3e0abe5ca680869989994b3cef26fae7e14565f854423560c66482ed166cc4a6c5412c6392bbad5ab08ac2c17964c6a4137873ae25e289d2fa2ba3b63a0187f9d436b0767e48a91d21780c701998c4f7e3cd29973997038ce13da62b0bd5357eeaaa14c17c8c2db0dcfcaedaff37d800a4b6a5c24304feb5bf48a0f50a49b56100fc316c6f4381f1e26e0ab8947c11ee2756809e0cc65261b1d02e63c9f16ef970a272f036f9f5818e2fc080512a11967c0deda2153ec90c4778bbfad3eb0b66075a5cbf9e1beb62fcdfd0536cf225e977a9339e5dbe11a06648ba8e4ce0cc5c1faa71d77a16d2484e33b10dd9471f182d5d960b5573ea6100b97a9985f529254c117295d86c7563ba0b65ea61f415bbd185a91a8165958674ae9f0bcbad1c5100a0a2c1bfb5a2c4622e8246267d7ebd26f2dfad7db7eacc019cd0fa0840e36f6318420df60be544571625a0e8ed1954ecb073a9f63766ad643e719b35730ef5b0efb499a974f74872cc369c697eb69aba0c38e607124fa87192ea6e3c30b11f874bbbb2e0d1a34910af50bd3d85dd325db53a1361f6b8ca0d7e6d8dada076d53a0738a7aacf2e0695ad86d47ee63fb9bfe0113cd8f9e4961bd1b5017cc216baf2317d91b61447c1a495f29da0bcacc1b01044bd64aca81b945f27ab8ab811c80fae951804697345a84398e2aecc5aacef44922d9b8754b800b433f5394a4b768d157937306ab149f86356e21c3c08d9849d1d077f77393c26958e06292519bad298cfc0a08b597f198b72abd790650b84b5abe1ea49de6e846d6dd1e3ebb949b63b59344bbfded30250dd0779c2942e0db6bb7a89325a6ce12880003453c7575fab0d2a3a8cd0f036bf7b60b2206ae04b16d818dbded5bdacf5a94cf93e158bdbe66fcb91b46d0033446463c302e4c4880af9d1a57aa49d64c4659aceb57fa1691e3ba86c0b13ea3219ee771662a85a9263ae724eae5c0f443bd892a9a4652a53d4b19db906bab192caacb43954d2bb619803b096a4c9f70a458b0ce7562dbdbde17ca400f6ae8a899f07bc17ac96491e804c91ee66db2525c6a752d41dc5cb4", 0x1000}], 0x1, 0x0, 0x0, 0x40}, {&(0x7f0000006d00)=@in={0x2, 0x4e22, @rand_addr=0x9}, 0x10, &(0x7f0000006e00)=[{&(0x7f0000006d40)="6f8c2a45e2acd17920023d14cab236aea361c06f8eaf85f1e915406271d8eb22bcfc7d409bf8c93ec84a6069d1608bc921c92356b37190303e6a74c36bea83610ef9c7cfa62fc92f7d04f704c93e6fea604684712e2044a0fa8dd08c59e9fc013459ec5cb371dce716b90ede897ce8ea347dc3f3bdfca77fb3c8ebb83ed838c707ead043e7ca4b67247ecda08efdd9acefbb39a754e77d", 0x97}], 0x1, &(0x7f0000007040)=[@sndrcv={0x30, 0x84, 0x1, {0x3, 0x4, 0x820b, 0x9, 0x1, 0x40, 0x9, 0x0, r7}}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x8, 0x6b, 0x4, r8}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @sndrcv={0x30, 0x84, 0x1, {0x800100, 0x7f, 0x8, 0x6, 0x7fff, 0xc30f, 0x8, 0x1f4b, r9}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x20}], 0xd0}, {&(0x7f0000007140)=@in={0x2, 0x4e23, @rand_addr=0x1}, 0x10, &(0x7f0000008400)=[{&(0x7f0000007180)="cb4c55119d2296505279733ad1c9fb7f655f02d9cefba30395335ae9c8b1c9252272daabab39ac64", 0x28}, {&(0x7f00000071c0)="e0e1", 0x2}, {&(0x7f0000007200)="6404c64056b39ef621c0e0bc3bee960905242cda11e1c2e3115905dc9f7ab26e54636c392e1459b35bf58e868ca582855a90700dac10e26b4177ffcce52e88f73a98f5d00612a22bf6a68edae968805be41ebefb9ed184b372913f05b3c3b80c84c6ff737259ef391e80c72dd0d96c2c1f651a502cb3225b5c0a69168aa3e57da04cfd3005482497b537ac68973dbd8ed8ba5e6bf3595b26e219bd", 0x9b}, {&(0x7f00000072c0)="c8b2e229afd244a6d99986ec7d", 0xd}, {&(0x7f0000007300)="0339256bca66", 0x6}, {&(0x7f0000007340)="8606e237b2146c09c8c8bf72c74fd40b4f9cd54a805359e50b3ca1247284a46067a83d884b5f134fd00675b2053d254edfd709a8f488bc75968925ee74a324c48b209a39cc683ec28ffc309ea45d10cbe9dc76de0cd1be457e0eaf4e936b6c26fe53524f0183161a72bbbe1081faff58607833608fc8b4f76ad73db6a6626845fb253ff42169", 0x86}, {&(0x7f0000007400)="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", 0x1000}], 0x7, &(0x7f0000009580)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x2, 0x0, r10}}, @sndrcv={0x30, 0x84, 0x1, {0x91f, 0x1, 0x2, 0x8, 0xda8, 0x6, 0x10001, 0x5, r11}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x1f}}], 0xa0, 0x4000800}], 0xa, 0x40) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:55 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x0, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:55 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) open(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x8a) epoll_create(0x3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x4001, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:30:55 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 16:30:55 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) setreuid(r0, 0xffffffffffffffff) 16:30:55 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x0, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:55 executing program 0: r0 = socket$inet(0x10, 0x800000000, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:55 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000180)={@dev, 0x0}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', r1}) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) 16:30:56 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 16:30:56 executing program 1: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:56 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9d, 0x208000) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0xb) r1 = socket$inet(0x10, 0x7, 0x400) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1f) 16:30:56 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x0, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:56 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x3f00}, 0x0) 16:30:56 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000240)={'bond_slave_0\x00\x0e\x00', {0x2, 0x0, @rand_addr=0x4000000}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) syz_execute_func(&(0x7f0000000000)="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") 16:30:56 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) open(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x8a) epoll_create(0x3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x4001, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:30:56 executing program 1: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:56 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x6ccc9a8d45801963, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0x7f) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000100)={0x2, 0x8, 0x857, 0x9, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) r1 = socket$inet(0x10, 0x802, 0x4000000f) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:56 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x4000}, 0x0) 16:30:56 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") read$rfkill(r0, &(0x7f0000000140), 0x8) 16:30:56 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:56 executing program 1: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) setreuid(0x0, 0xffffffffffffffff) 16:30:56 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 16:30:57 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r2, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000001b9, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r3 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0xa03) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 16:30:57 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) 16:30:57 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xb709}, 0x0) 16:30:57 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:57 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) open(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x8a) epoll_create(0x3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x4001, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:30:57 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") ioctl$void(r0, 0xc0045878) 16:30:57 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 16:30:57 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) [ 732.579677][ T1798] cgroup: fork rejected by pids controller in /syz1 16:30:57 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x34000}, 0x0) 16:30:57 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0xc25, 0x4) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) 16:30:57 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:57 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x400300}, 0x0) [ 732.915427][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 732.915433][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 732.915484][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 732.921253][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 732.921372][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 732.944575][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:30:57 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r2, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000001b9, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r3 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0xa03) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000000000080050a000002000000baf5bc41ed430d7700000080080000000000000000000000000000000f0000c00400000001000000dbffffff000000000400000005000000000000000000000000a843000000190000c00800000003000000008000000300000000000100080000000000000000000000000000000d0000000200000002000000020000000000008000800000833000000000000000000000000000001f0000c000000000020000000000000001000000f8ffffff00180000000000000000000000000000e0f66cd73185c379f79a68567640aa966826bdd4e6301759f2e89e94c6c67e0f8515e8d7afd4f56bd65928"]) 16:30:57 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") epoll_wait(r0, &(0x7f0000000140)=[{}, {}, {}], 0x3, 0x4) 16:30:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:57 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:58 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) open(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x8a) epoll_create(0x3) syz_execute_func(&(0x7f0000000000)="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") 16:30:58 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 16:30:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:58 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:58 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getflags(r0, 0x401) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0xe74, 0x80000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x203, 0x0) syz_execute_func(&(0x7f0000000000)="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") r1 = msgget(0x3, 0x400) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000002c0)=""/221) 16:30:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:58 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 16:30:58 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:30:58 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r2, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000001b9, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r3 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000707041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0xa03) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 16:30:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:58 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(0x0) 16:30:58 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 16:30:58 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) open(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x8a) syz_execute_func(&(0x7f0000000000)="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") 16:30:58 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000140)=0x4000, 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x2, 0x10800) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000200)={&(0x7f00000001c0)=[0x1, 0xd7a, 0x40, 0x80000000000, 0x82, 0x1, 0x1], 0x7, 0xe9, 0x8, 0x0, 0x80000000000, 0x4, {0x3, 0x7, 0x5, 0x3, 0x80000, 0x1, 0x0, 0x100000001, 0x1, 0x5, 0x10001, 0x5, 0x165, 0x80000001, "bf7f23a3a374c7ce71106e21493374dc81ec262d906aa66c312af22cd80cd27f"}}) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000280)) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000005, 0x12, r1, 0x180000000) 16:30:58 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) 16:30:58 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(0x0) 16:30:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:59 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 16:30:59 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(0x0) 16:30:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:59 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) 16:30:59 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0xfffffffffffffff9, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={r1}, 0x8) 16:30:59 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000380)={0xf, 0x0, 0x7, {0x9, 0x6, 0x9, 0x5a}}) syz_execute_func(&(0x7f0000000000)="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") 16:30:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:59 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) 16:30:59 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0xfffffffffffffffc, 0x0) syz_execute_func(&(0x7f0000000000)="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") ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000140)={0xcc2, 0x694f7f5b, 0x3, @stepwise={0x101, 0x8, 0x80, 0x8001, 0x4}}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000001c0)={0x5, 0xd, 0x4, 0x0, {0x77359400}, {0x3, 0x2502ebedec433dc6, 0xc, 0x7, 0x800, 0x5c14, "d9117d8c"}, 0xb0, 0x3, @offset=0x9, 0x4}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) 16:30:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:59 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 16:30:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:30:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:00 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000140)=0x9) shmget$private(0x0, 0x1000, 0x90, &(0x7f0000ffe000/0x1000)=nil) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x3}}, 0x71, 0x3, 0x10000, 0x8000}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000380)={r1, 0xcc, &(0x7f0000000280)=[@in6={0xa, 0x4e20, 0xffffffffffffff80, @mcast1, 0x7e7}, @in6={0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e24, 0xfffffffffffff801, @mcast1, 0x8000}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e23, 0x8001, @local, 0x8000}, @in6={0xa, 0x4e20, 0x6000, @ipv4={[], [], @local}, 0x2}, @in={0x2, 0x4e23, @multicast2}]}, &(0x7f00000003c0)=0x10) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:31:00 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x1, 0xec}) syz_execute_func(&(0x7f0000000000)="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") 16:31:00 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 16:31:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000040)=0x8000) 16:31:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:00 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:31:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:00 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x40000000}, 0x0) 16:31:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xfffffffffffffffe, 0x0) write$binfmt_elf32(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/477], 0x1d1) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x0, @loopback, 0x4e21, 0x0, 'lc\x00'}, {@loopback}}, 0x44) ioctl(r0, 0x1, &(0x7f00000003c0)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x101040) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r2, 0xc0104307, &(0x7f0000000100)) r3 = dup(r0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000000)={0x5, 0x773f, 0x6}) pidfd_send_signal(r1, 0x12, &(0x7f0000000340)={0x41, 0x6, 0x3d7}, 0x0) 16:31:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:00 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 16:31:01 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xdfd1923cd81090b7, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:01 executing program 2 (fault-call:8 fault-nth:0): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:01 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 16:31:01 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80080, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000001c0)={0x15, 0x27, &(0x7f0000000180)="493167c670a74b043f5822a40a27b8d2c4de77c5473699fe3f062ee78edff7cd8160e772895bfc"}) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000200)={0x3, 0x0, [{}, {}, {}]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) wait4(r1, &(0x7f0000000280), 0x60000001, &(0x7f00000002c0)) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000380)=0x7, &(0x7f00000003c0)=0xfe4d) 16:31:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 736.954484][ T3091] FAULT_INJECTION: forcing a failure. [ 736.954484][ T3091] name failslab, interval 1, probability 0, space 0, times 0 16:31:01 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xb7090000}, 0x0) [ 737.028666][ T3091] CPU: 0 PID: 3091 Comm: syz-executor.2 Not tainted 5.1.0-rc7-next-20190501 #34 [ 737.037728][ T3091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.048015][ T3091] Call Trace: [ 737.051345][ T3091] dump_stack+0x172/0x1f0 [ 737.055689][ T3091] should_fail.cold+0xa/0x15 [ 737.055709][ T3091] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 737.055732][ T3091] ? ___might_sleep+0x163/0x280 [ 737.055761][ T3091] __should_failslab+0x121/0x190 16:31:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 737.076137][ T3091] should_failslab+0x9/0x14 [ 737.081797][ T3091] kmem_cache_alloc_trace+0x2d1/0x760 [ 737.087396][ T3091] ? aa_file_perm+0x432/0xeb0 [ 737.092188][ T3091] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 737.098456][ T3091] ext4_readdir+0x2297/0x3490 [ 737.103153][ T3091] ? mark_held_locks+0xf0/0xf0 [ 737.107942][ T3091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.114399][ T3091] ? __ext4_check_dir_entry+0x350/0x350 [ 737.119965][ T3091] ? lock_acquire+0x16f/0x3f0 [ 737.124737][ T3091] ? iterate_dir+0xd8/0x5f0 16:31:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 737.129270][ T3091] ? kasan_check_write+0x14/0x20 [ 737.137458][ T3091] iterate_dir+0x489/0x5f0 [ 737.141903][ T3091] __ia32_compat_sys_getdents+0x1c7/0x360 [ 737.147653][ T3091] ? __x32_compat_sys_old_readdir+0x1d0/0x1d0 [ 737.153746][ T3091] ? rcu_read_lock_sched_held+0x110/0x130 [ 737.159492][ T3091] ? filldir+0x420/0x420 [ 737.163764][ T3091] ? do_int80_syscall_32+0x25/0x6d0 [ 737.168991][ T3091] ? lockdep_hardirqs_on+0x418/0x5d0 [ 737.174304][ T3091] ? trace_hardirqs_on+0x67/0x230 16:31:01 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 737.179375][ T3091] do_int80_syscall_32+0x14d/0x6d0 [ 737.184617][ T3091] entry_INT80_compat+0x76/0x80 [ 737.189665][ T3091] RIP: 0033:0x20000305 [ 737.193752][ T3091] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 8d 91 cd 80 <1b> 69 69 6c 69 dc 02 d9 d9 d0 c4 41 39 fd 5b f9 c7 c7 e4 c6 53 fb [ 737.213376][ T3091] RSP: 002b:00007f83f270dbd8 EFLAGS: 00000246 ORIG_RAX: 000000000000008d [ 737.221825][ T3091] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 0000000020000300 [ 737.229829][ T3091] RDX: 47ad1c0bdddf8e09 RSI: 0000000000000000 RDI: 00007f83f270e608 [ 737.237857][ T3091] RBP: 000000000000000a R08: 0000000000000005 R09: 0000000000000006 [ 737.245867][ T3091] R10: 0000000000000007 R11: 0000000000000008 R12: 000000000000000b [ 737.254038][ T3091] R13: 000000000000000c R14: 000000000000000d R15: 000000000000000a 16:31:02 executing program 5: syz_execute_func(&(0x7f0000000000)="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") 16:31:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:02 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000140)={0xd6, 0x8, 0xe9a, 0x10001, 0x40, 0x9}) 16:31:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:02 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 16:31:02 executing program 2 (fault-call:8 fault-nth:1): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 737.815102][ T3157] FAULT_INJECTION: forcing a failure. [ 737.815102][ T3157] name failslab, interval 1, probability 0, space 0, times 0 [ 737.875762][ T3157] CPU: 0 PID: 3157 Comm: syz-executor.2 Not tainted 5.1.0-rc7-next-20190501 #34 [ 737.884841][ T3157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.894939][ T3157] Call Trace: [ 737.898273][ T3157] dump_stack+0x172/0x1f0 [ 737.902691][ T3157] should_fail.cold+0xa/0x15 [ 737.907319][ T3157] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 737.907345][ T3157] ? ___might_sleep+0x163/0x280 [ 737.907370][ T3157] __should_failslab+0x121/0x190 [ 737.907408][ T3157] should_failslab+0x9/0x14 [ 737.918245][ T3157] __kmalloc+0x2dc/0x740 [ 737.918268][ T3157] ? str2hashbuf_unsigned+0x2a0/0x2a0 [ 737.918281][ T3157] ? ext4_htree_store_dirent+0x8a/0x650 [ 737.918300][ T3157] ext4_htree_store_dirent+0x8a/0x650 [ 737.918334][ T3157] htree_dirblock_to_tree+0x4e5/0x8f0 [ 737.918362][ T3157] ? dx_probe+0x1120/0x1120 [ 737.918384][ T3157] ? mark_held_locks+0xf0/0xf0 [ 737.918423][ T3157] ext4_htree_fill_tree+0x252/0xa50 [ 737.969941][ T3157] ? find_held_lock+0x35/0x130 [ 737.974738][ T3157] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 737.980409][ T3157] ? do_split+0x1f10/0x1f10 [ 737.984975][ T3157] ? ext4_readdir+0x2297/0x3490 [ 737.989869][ T3157] ? rcu_read_lock_sched_held+0x110/0x130 [ 737.995614][ T3157] ? kmem_cache_alloc_trace+0x354/0x760 [ 738.001191][ T3157] ? aa_file_perm+0x432/0xeb0 [ 738.005989][ T3157] ext4_readdir+0x1999/0x3490 [ 738.010773][ T3157] ? mark_held_locks+0xf0/0xf0 [ 738.015584][ T3157] ? __ext4_check_dir_entry+0x350/0x350 [ 738.021155][ T3157] ? lock_acquire+0x16f/0x3f0 [ 738.025853][ T3157] ? iterate_dir+0xd8/0x5f0 [ 738.030381][ T3157] ? kasan_check_write+0x14/0x20 [ 738.035363][ T3157] iterate_dir+0x489/0x5f0 [ 738.039813][ T3157] __ia32_compat_sys_getdents+0x1c7/0x360 [ 738.045563][ T3157] ? ksys_write+0x1f1/0x2d0 [ 738.050182][ T3157] ? __x32_compat_sys_old_readdir+0x1d0/0x1d0 [ 738.056269][ T3157] ? filldir+0x420/0x420 [ 738.060540][ T3157] ? do_int80_syscall_32+0x25/0x6d0 [ 738.065856][ T3157] ? lockdep_hardirqs_on+0x418/0x5d0 [ 738.071163][ T3157] ? trace_hardirqs_on+0x67/0x230 16:31:02 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 738.076210][ T3157] do_int80_syscall_32+0x14d/0x6d0 [ 738.081351][ T3157] entry_INT80_compat+0x76/0x80 [ 738.086216][ T3157] RIP: 0033:0x20000305 [ 738.090301][ T3157] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 8d 91 cd 80 <1b> 69 69 6c 69 dc 02 d9 d9 d0 c4 41 39 fd 5b f9 c7 c7 e4 c6 53 fb [ 738.110311][ T3157] RSP: 002b:00007f83f270dbd8 EFLAGS: 00000246 ORIG_RAX: 000000000000008d [ 738.118755][ T3157] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 0000000020000300 16:31:02 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 16:31:02 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 738.126739][ T3157] RDX: 47ad1c0bdddf8e09 RSI: 0000000000000000 RDI: 00007f83f270e608 [ 738.134727][ T3157] RBP: 000000000000000a R08: 0000000000000005 R09: 0000000000000006 [ 738.134736][ T3157] R10: 0000000000000007 R11: 0000000000000008 R12: 000000000000000b [ 738.134743][ T3157] R13: 000000000000000c R14: 000000000000000d R15: 000000000000000a 16:31:03 executing program 5: syz_execute_func(&(0x7f0000000000)="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") 16:31:03 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:03 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 16:31:03 executing program 2 (fault-call:8 fault-nth:2): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:03 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) fstat(r1, &(0x7f0000000040)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) 16:31:03 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 738.712419][ T3348] FAULT_INJECTION: forcing a failure. [ 738.712419][ T3348] name failslab, interval 1, probability 0, space 0, times 0 [ 738.769930][ T3348] CPU: 0 PID: 3348 Comm: syz-executor.2 Not tainted 5.1.0-rc7-next-20190501 #34 [ 738.779027][ T3348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.789185][ T3348] Call Trace: [ 738.792521][ T3348] dump_stack+0x172/0x1f0 [ 738.796994][ T3348] should_fail.cold+0xa/0x15 [ 738.801605][ T3348] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 738.807438][ T3348] ? ___might_sleep+0x163/0x280 [ 738.812429][ T3348] __should_failslab+0x121/0x190 [ 738.817382][ T3348] should_failslab+0x9/0x14 [ 738.821917][ T3348] __kmalloc+0x2dc/0x740 [ 738.826177][ T3348] ? str2hashbuf_unsigned+0x2a0/0x2a0 [ 738.831559][ T3348] ? ext4_htree_store_dirent+0x8a/0x650 [ 738.837117][ T3348] ext4_htree_store_dirent+0x8a/0x650 [ 738.842504][ T3348] htree_dirblock_to_tree+0x4e5/0x8f0 [ 738.847908][ T3348] ? dx_probe+0x1120/0x1120 [ 738.852443][ T3348] ? mark_held_locks+0xf0/0xf0 [ 738.857231][ T3348] ext4_htree_fill_tree+0x252/0xa50 [ 738.862438][ T3348] ? find_held_lock+0x35/0x130 [ 738.867232][ T3348] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 738.872900][ T3348] ? do_split+0x1f10/0x1f10 [ 738.877431][ T3348] ? ext4_readdir+0x2297/0x3490 [ 738.882291][ T3348] ? rcu_read_lock_sched_held+0x110/0x130 [ 738.888031][ T3348] ? kmem_cache_alloc_trace+0x354/0x760 [ 738.893584][ T3348] ? aa_file_perm+0x432/0xeb0 [ 738.898275][ T3348] ext4_readdir+0x1999/0x3490 [ 738.902977][ T3348] ? mark_held_locks+0xf0/0xf0 [ 738.907771][ T3348] ? __ext4_check_dir_entry+0x350/0x350 [ 738.913341][ T3348] ? lock_acquire+0x16f/0x3f0 [ 738.918032][ T3348] ? iterate_dir+0xd8/0x5f0 [ 738.922562][ T3348] ? kasan_check_write+0x14/0x20 [ 738.927689][ T3348] iterate_dir+0x489/0x5f0 [ 738.932128][ T3348] __ia32_compat_sys_getdents+0x1c7/0x360 [ 738.937862][ T3348] ? ksys_write+0x1f1/0x2d0 [ 738.942418][ T3348] ? __x32_compat_sys_old_readdir+0x1d0/0x1d0 [ 738.948511][ T3348] ? filldir+0x420/0x420 [ 738.952785][ T3348] ? do_int80_syscall_32+0x25/0x6d0 [ 738.958353][ T3348] ? lockdep_hardirqs_on+0x418/0x5d0 [ 738.963660][ T3348] ? trace_hardirqs_on+0x67/0x230 [ 738.968701][ T3348] do_int80_syscall_32+0x14d/0x6d0 [ 738.973850][ T3348] entry_INT80_compat+0x76/0x80 [ 738.978704][ T3348] RIP: 0033:0x20000305 [ 738.982780][ T3348] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 8d 91 cd 80 <1b> 69 69 6c 69 dc 02 d9 d9 d0 c4 41 39 fd 5b f9 c7 c7 e4 c6 53 fb [ 739.002479][ T3348] RSP: 002b:00007f83f270dbd8 EFLAGS: 00000246 ORIG_RAX: 000000000000008d [ 739.010901][ T3348] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 0000000020000300 16:31:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 739.018878][ T3348] RDX: 47ad1c0bdddf8e09 RSI: 0000000000000000 RDI: 00007f83f270e608 [ 739.026849][ T3348] RBP: 000000000000000a R08: 0000000000000005 R09: 0000000000000006 [ 739.034820][ T3348] R10: 0000000000000007 R11: 0000000000000008 R12: 000000000000000b [ 739.042792][ T3348] R13: 000000000000000c R14: 000000000000000d R15: 000000000000000a 16:31:03 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000100)=0x8) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000180)={@remote, @initdev, 0x0}, &(0x7f00000001c0)=0xc) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x3}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getstats={0x1c, 0x5e, 0x14, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r1, 0x2}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0x800) write$P9_RSTAT(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="640000007d020000005d000300ff000000200100000007000000000000000000180002000000060000000500000000000000000019002e76626f786e6574315e242a6b657972696e677b776c616e3102002d3a0f002f6465762f646c6d5f706c6f636b00"], 0x64) syz_execute_func(&(0x7f0000000680)="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") ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x800000000000065, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}]}) 16:31:03 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 16:31:03 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:04 executing program 5: syz_execute_func(&(0x7f0000000000)="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") 16:31:04 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:04 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x20, {{0xa, 0x4e24, 0x0, @ipv4={[], [], @broadcast}, 0x10001}}}, 0x88) 16:31:04 executing program 2 (fault-call:8 fault-nth:3): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:04 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 16:31:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:04 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) [ 739.623705][ T3502] FAULT_INJECTION: forcing a failure. [ 739.623705][ T3502] name failslab, interval 1, probability 0, space 0, times 0 [ 739.636880][ T3502] CPU: 1 PID: 3502 Comm: syz-executor.2 Not tainted 5.1.0-rc7-next-20190501 #34 [ 739.646028][ T3502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.656360][ T3502] Call Trace: [ 739.656462][ T3502] dump_stack+0x172/0x1f0 [ 739.656488][ T3502] should_fail.cold+0xa/0x15 [ 739.656507][ T3502] ? __f_unlock_pos+0x19/0x20 [ 739.656527][ T3502] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 739.656544][ T3502] ? __sigqueue_alloc+0x173/0x4d0 [ 739.656561][ T3502] ? find_held_lock+0x35/0x130 [ 739.656585][ T3502] __should_failslab+0x121/0x190 [ 739.656604][ T3502] should_failslab+0x9/0x14 [ 739.656619][ T3502] kmem_cache_alloc+0x47/0x6f0 [ 739.656647][ T3502] ? kasan_check_read+0x11/0x20 [ 739.679641][ T3502] __sigqueue_alloc+0x268/0x4d0 [ 739.679672][ T3502] __send_signal+0xdff/0x1590 [ 739.679696][ T3502] send_signal+0x49/0xd0 [ 739.679714][ T3502] force_sig_info+0x251/0x310 [ 739.679738][ T3502] force_sig+0x23/0x30 [ 739.737721][ T3502] do_general_protection+0x1f6/0x300 [ 739.743344][ T3502] ? general_protection+0x8/0x30 [ 739.748605][ T3502] general_protection+0x1e/0x30 [ 739.753481][ T3502] RIP: 0033:0x20000308 16:31:04 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 16:31:04 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="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") [ 739.757665][ T3502] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 8d 91 cd 80 1b 69 69 <6c> 69 dc 02 d9 d9 d0 c4 41 39 fd 5b f9 c7 c7 e4 c6 53 fb 6d 58 c4 [ 739.777462][ T3502] RSP: 002b:00007f83f270dbd8 EFLAGS: 00010283 [ 739.783545][ T3502] RAX: ffffffffffffffea RBX: 0000000000000009 RCX: 0000000020000300 [ 739.791535][ T3502] RDX: 47ad1c0bdddf8e09 RSI: 0000000000000000 RDI: 00007f83f270e608 [ 739.799609][ T3502] RBP: 00000000c9989b26 R08: 0000000000000005 R09: 0000000000000006 [ 739.799619][ T3502] R10: 0000000000000007 R11: 0000000000000008 R12: 000000000000000b [ 739.799626][ T3502] R13: 000000000000000c R14: 000000000000000d R15: 000000000000000a 16:31:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:04 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 16:31:04 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:05 executing program 5: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0xdfd1923cd81090b7, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:05 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 16:31:05 executing program 2 (fault-call:8 fault-nth:4): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:05 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) 16:31:05 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:05 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") r1 = msgget(0x1, 0x8) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000280)=""/237) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) 16:31:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:05 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xa00000000000000}, 0x0) 16:31:05 executing program 5: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0xdfd1923cd81090b7, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:05 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc07d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:05 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xe00000000000000}, 0x0) 16:31:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:05 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) getsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)=""/89, &(0x7f0000000080)=0x59) syz_execute_func(&(0x7f00000003c0)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000004000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426c402050ac60f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065750f7cb4d8d8a1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d0036b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc26f6aea3b50000c4426507af0f0000000f5fd25cf3460f6431f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") accept4$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000740)=0x14, 0x80800) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000780)={r1, 0x1, 0x6, @local}, 0x10) 16:31:06 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc0fd9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:06 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) 16:31:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:06 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000140)=0xe, 0x4) syz_execute_func(&(0x7f0000000300)="994a2ae92c02964c0f05c4a2797942d7c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426c4427d178f998999990f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec42231df9d06000000c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045cccc481797eaffeffffffc4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x7f000, 0x4) 16:31:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:06 executing program 5: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0xdfd1923cd81090b7, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:31:06 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc10d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:06 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 16:31:06 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x442080, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8be8}, 0x8) ioctl$void(r0, 0x5450) syz_execute_func(&(0x7f0000000000)="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") 16:31:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:06 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) 16:31:06 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f480feebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:07 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4810eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:07 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x6000000000000000}, 0x0) 16:31:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:07 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:31:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpeername$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000180)=0x1c) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x20080, 0x0) r2 = getpgid(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000000000001be3b0af5e9590000c0ffff0000090000008000886fdaab37d8cc0e1e93cf70ba9359dd91313c91966567dc3cfca337e37d20de95a20d4f18f007c437f403a6317f01f43ccbfac8f7b77285ca799d9bcdb73a230ba155fd30b4dd996b517d3fe27707cd53ef6de9ddbf7daf24c03d5717874f2d63b5a274192141ad79f7"]) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000200)=r2) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) syz_execute_func(&(0x7f0000000000)="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") 16:31:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:07 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00200802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:07 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) [ 743.197496][ T4340] cgroup: fork rejected by pids controller in /syz0 16:31:07 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00400802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:08 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xb709000000000000}, 0x0) 16:31:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:08 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00600802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:08 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) 16:31:08 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(0x0) 16:31:08 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:08 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 16:31:08 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00c00802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:08 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(0x0) 16:31:08 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(0x0) 16:31:08 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) 16:31:08 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce01200802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:08 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) 16:31:09 executing program 3: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x40, &(0x7f0000ffb000/0x2000)=nil, 0x1f}) syz_execute_func(&(0x7f0000000000)="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") 16:31:09 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00006802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:09 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:09 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:09 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:09 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x4c200, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) setxattr$trusted_overlay_nlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'U-', 0x9}, 0x28, 0x3) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000200)={0xf, @capture={0x1000, 0x1, {0x7b, 0x3}, 0x1, 0x1}}) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000180)={{0x1, @name="f19be48ebe08dfabd52ecd8ae000b93b258eef8f961e6fab66f2d059a888821d"}, 0x8, 0x5, 0x7fffffff}) syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3, 0x80000) syz_execute_func(&(0x7f0000000000)="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") 16:31:09 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce0000c802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:09 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:09 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:09 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00012802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:10 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:10 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00020802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:10 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:10 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:10 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:10 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce06b26802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:10 executing program 5 (fault-call:1 fault-nth:0): openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:10 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="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") r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x8c0) prctl$PR_SET_ENDIAN(0x14, 0x2) [ 746.070142][ T4845] FAULT_INJECTION: forcing a failure. [ 746.070142][ T4845] name failslab, interval 1, probability 0, space 0, times 0 16:31:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 746.120053][ T4845] CPU: 0 PID: 4845 Comm: syz-executor.5 Not tainted 5.1.0-rc7-next-20190501 #34 [ 746.130222][ T4845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.140417][ T4845] Call Trace: [ 746.143937][ T4845] dump_stack+0x172/0x1f0 [ 746.149284][ T4845] should_fail.cold+0xa/0x15 [ 746.156204][ T4845] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 746.165842][ T4845] ? ___might_sleep+0x163/0x280 [ 746.171088][ T4845] __should_failslab+0x121/0x190 [ 746.176357][ T4845] should_failslab+0x9/0x14 [ 746.183437][ T4845] __kmalloc_track_caller+0x2d8/0x740 [ 746.189114][ T4845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.195574][ T4845] ? security_capable+0x9b/0xd0 [ 746.201043][ T4845] ? btrfs_control_ioctl+0x44/0x2d0 [ 746.207548][ T4845] ? btrfs_put_super+0x50/0x50 [ 746.212673][ T4845] memdup_user+0x26/0xb0 16:31:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 746.217710][ T4845] btrfs_control_ioctl+0x44/0x2d0 [ 746.223577][ T4845] __x32_compat_sys_ioctl+0x197/0x620 [ 746.230118][ T4845] do_syscall_64+0x103/0x670 [ 746.241477][ T4845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.248540][ T4845] RIP: 0033:0x2000000a [ 746.253515][ T4845] Code: Bad RIP value. [ 746.258375][ T4845] RSP: 002b:00007f07dc783bd8 EFLAGS: 00000296 ORIG_RAX: 0000000000000202 16:31:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:10 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x400040, 0x0) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x5, 0x200800) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x620100, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000180)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1004}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r2, 0x108, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) 16:31:10 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce0003f802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:10 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 746.267872][ T4845] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000002000000a [ 746.276857][ T4845] RDX: 0000000000000000 RSI: 00000000000001de RDI: 0000000000000003 [ 746.286687][ T4845] RBP: 000000000000006f R08: 0000000000000005 R09: 0000000000000006 [ 746.295510][ T4845] R10: 0000000000000007 R11: 0000000000000296 R12: 000000000000000b [ 746.305134][ T4845] R13: 000000000000000c R14: 000000000000000d R15: 0000000000000004 16:31:11 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:11 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:11 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00040802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:11 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:31:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:11 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:11 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce0266b802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:11 executing program 3: syz_execute_func(&(0x7f0000000000)="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") 16:31:11 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:11 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:11 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00fff802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:11 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:11 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:12 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:12 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce0006b262000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:12 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:12 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:12 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x80, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:12 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:12 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00002802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:12 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:12 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:12 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00004802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:12 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:12 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:12 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00006802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:13 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:13 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce0000c802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:13 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:13 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c05964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:31:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 16:31:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:13 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00012802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:13 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:13 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 16:31:13 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802002c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:13 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x7ff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xfffffffeffffffff, 0xca}, 0x0, 0x0, &(0x7f00000001c0)={0x7, 0xd677, 0x7f, 0x10001}, &(0x7f0000000200)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x3ff}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r1, 0x4) syz_execute_func(&(0x7f0000000000)="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") prctl$PR_SET_THP_DISABLE(0x29, 0x1) 16:31:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 16:31:14 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:14 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802004c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:14 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:14 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:14 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:14 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802006c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:14 executing program 0 (fault-call:5 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x101100, 0x0) syz_execute_func(&(0x7f00000003c0)="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") dup3(r0, r0, 0x80000) [ 749.748174][ T5879] FAULT_INJECTION: forcing a failure. [ 749.748174][ T5879] name failslab, interval 1, probability 0, space 0, times 0 16:31:14 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 749.833233][ T5879] CPU: 0 PID: 5879 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 749.842344][ T5879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.852442][ T5879] Call Trace: [ 749.855771][ T5879] dump_stack+0x172/0x1f0 [ 749.860145][ T5879] should_fail.cold+0xa/0x15 [ 749.864781][ T5879] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 749.872219][ T5879] ? ___might_sleep+0x163/0x280 [ 749.872241][ T5879] __should_failslab+0x121/0x190 16:31:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 749.872262][ T5879] should_failslab+0x9/0x14 [ 749.872286][ T5879] kmem_cache_alloc+0x2b2/0x6f0 [ 749.891647][ T5879] ? fput+0x1b/0x20 [ 749.895481][ T5879] ? ksys_write+0x1f1/0x2d0 [ 749.900026][ T5879] getname_flags+0xd6/0x5b0 [ 749.904571][ T5879] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.910689][ T5879] getname+0x1a/0x20 [ 749.914641][ T5879] __x64_sys_execve+0x73/0xc0 [ 749.919369][ T5879] do_syscall_64+0x103/0x670 [ 749.924096][ T5879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.930028][ T5879] RIP: 0033:0x458da9 [ 749.933960][ T5879] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 749.953859][ T5879] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 749.962402][ T5879] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 749.970427][ T5879] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 16:31:14 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000240)=0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) io_submit(r1, 0x4, &(0x7f0000000600)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0xecd4, r0, &(0x7f0000000280)="0e076aa2fe30c14107aa30d1b352af702cfd4b6b17033fde0f3eb9ef01be5fafc80c8c8c5dad538ef541da0750852614c490d7abe18545c6497aea9620000609495246a5bcab0db2b9fe23aa777fd47145bf9675e41e339b72dc37114ab22fec87aebf0776a842b313444be4b68354be0b7f1cb3f2742a875f0987ad6f97054090cacf5bf228b41867d23e6271dba87be541b4e4e0fa4395945cd919188e5a1cf190d4921ae64baceae83aa0f339e4ed53356081ae3f4d458af4bb7d78aee27f568b9436a09d9cc1cfae9f03dd2c1c39aae935e9e194368f1937d1096097741820fa43fc33ab1232", 0xe8, 0x80000001, 0x0, 0x0, r0}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x2b0c, r2, &(0x7f00000003c0)="b4007176d27f8348bd3977c476027e", 0xf, 0x6, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xe, 0x9, r0, &(0x7f0000000440)="3e15e81799d6ccf0bc1577127d96abd2b895a3e76594a2e014f7335e74f855396a552df65e71315051c556ac32259bd6d73e89f4593e383748ee53b4f4d861ced6c37fb85aa9d6484a527014dd09c7247b38e3b8418088ce242209405e4fc2c51f67168271f51aebb14fb64eeb57625e12aac6a1c6d73045a06e39811371e32d5a9b345de72e5d575969d366db93b223adadf61b7aba3d04e19b29b5c3462e783764e2543e63790b64222a5c5a7534c63df895311f6edac128f4a3c138485d090b3f3f7ff9de330e41054e98", 0xcc, 0x80, 0x0, 0x0, r0}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x3, 0x0, r0, &(0x7f0000000580)="68aa59a21890", 0x6, 0x101, 0x0, 0x3, 0xffffffffffffff9c}]) syz_execute_func(&(0x7f0000000000)="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") ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0xf, @pix={0x71d, 0x4, 0x30397657, 0x5, 0x7, 0x5, 0x0, 0x2, 0x1, 0x1}}) [ 749.978435][ T5879] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 749.986435][ T5879] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 749.994435][ T5879] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:14 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:14 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce0000080200cc423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:14 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:14 executing program 0 (fault-call:5 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:14 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:14 executing program 3: r0 = epoll_create(0x100000001) ftruncate(r0, 0x5) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:14 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802012c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 750.230432][ T6017] FAULT_INJECTION: forcing a failure. [ 750.230432][ T6017] name failslab, interval 1, probability 0, space 0, times 0 [ 750.288702][ T6017] CPU: 0 PID: 6017 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 750.297788][ T6017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.309811][ T6017] Call Trace: [ 750.313585][ T6017] dump_stack+0x172/0x1f0 [ 750.318161][ T6017] should_fail.cold+0xa/0x15 [ 750.322881][ T6017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 750.328835][ T6017] ? ___might_sleep+0x163/0x280 [ 750.328865][ T6017] __should_failslab+0x121/0x190 [ 750.338702][ T6017] should_failslab+0x9/0x14 [ 750.338717][ T6017] kmem_cache_alloc+0x2b2/0x6f0 [ 750.338732][ T6017] ? save_stack+0x5c/0x90 [ 750.338742][ T6017] ? save_stack+0x23/0x90 [ 750.338756][ T6017] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 750.338778][ T6017] ? kasan_slab_alloc+0xf/0x20 [ 750.367377][ T6017] ? kmem_cache_alloc+0x11a/0x6f0 [ 750.372450][ T6017] dup_fd+0x85/0xb30 [ 750.376389][ T6017] unshare_fd+0x160/0x1d0 [ 750.380761][ T6017] ? pidfd_release+0x50/0x50 [ 750.385374][ T6017] ? find_held_lock+0x35/0x130 [ 750.390180][ T6017] unshare_files+0x7f/0x1f0 [ 750.394796][ T6017] ? __ia32_sys_unshare+0x40/0x40 [ 750.399965][ T6017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.408684][ T6017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.415058][ T6017] __do_execve_file.isra.0+0x27e/0x22f0 [ 750.420724][ T6017] ? __check_object_size+0x3d/0x42f [ 750.425961][ T6017] ? copy_strings_kernel+0x110/0x110 [ 750.431275][ T6017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.437640][ T6017] ? getname_flags+0x277/0x5b0 [ 750.442457][ T6017] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.448566][ T6017] __x64_sys_execve+0x8f/0xc0 [ 750.453278][ T6017] do_syscall_64+0x103/0x670 [ 750.457923][ T6017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.463839][ T6017] RIP: 0033:0x458da9 [ 750.467765][ T6017] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:31:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:15 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:15 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:15 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 750.487408][ T6017] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 750.487424][ T6017] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 750.487432][ T6017] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 750.487452][ T6017] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 750.511883][ T6017] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 750.511892][ T6017] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:15 executing program 0 (fault-call:5 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:15 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 750.707085][ T6052] FAULT_INJECTION: forcing a failure. [ 750.707085][ T6052] name failslab, interval 1, probability 0, space 0, times 0 [ 750.730141][ T6052] CPU: 0 PID: 6052 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 750.739434][ T6052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.749628][ T6052] Call Trace: [ 750.752954][ T6052] dump_stack+0x172/0x1f0 [ 750.757338][ T6052] should_fail.cold+0xa/0x15 [ 750.761971][ T6052] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 750.767815][ T6052] ? ___might_sleep+0x163/0x280 [ 750.772715][ T6052] __should_failslab+0x121/0x190 [ 750.777689][ T6052] should_failslab+0x9/0x14 [ 750.777704][ T6052] kmem_cache_alloc+0x2b2/0x6f0 [ 750.777719][ T6052] ? save_stack+0x5c/0x90 [ 750.777730][ T6052] ? save_stack+0x23/0x90 [ 750.777743][ T6052] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 750.777765][ T6052] ? kasan_slab_alloc+0xf/0x20 [ 750.787169][ T6052] ? kmem_cache_alloc+0x11a/0x6f0 [ 750.787186][ T6052] dup_fd+0x85/0xb30 [ 750.787216][ T6052] unshare_fd+0x160/0x1d0 [ 750.787234][ T6052] ? pidfd_release+0x50/0x50 [ 750.787247][ T6052] ? cache_grow_end+0xa4/0x190 [ 750.787268][ T6052] unshare_files+0x7f/0x1f0 [ 750.787285][ T6052] ? __ia32_sys_unshare+0x40/0x40 [ 750.787321][ T6052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.796039][ T6052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.796060][ T6052] __do_execve_file.isra.0+0x27e/0x22f0 [ 750.796078][ T6052] ? __check_object_size+0x3d/0x42f [ 750.796101][ T6052] ? copy_strings_kernel+0x110/0x110 [ 750.796116][ T6052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.796131][ T6052] ? getname_flags+0x277/0x5b0 [ 750.796149][ T6052] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.796173][ T6052] __x64_sys_execve+0x8f/0xc0 [ 750.813432][ T6052] do_syscall_64+0x103/0x670 [ 750.813458][ T6052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.813470][ T6052] RIP: 0033:0x458da9 [ 750.813487][ T6052] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 750.813495][ T6052] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 750.941444][ T6052] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 750.949460][ T6052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 750.957450][ T6052] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 750.965433][ T6052] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 750.973410][ T6052] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:15 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:15 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea02efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:16 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000240)='/dev/udmabuf\x00', 0x2) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000140)=0x6, 0x1) 16:31:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:16 executing program 0 (fault-call:5 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:16 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:16 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea03efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 751.394360][ T6177] FAULT_INJECTION: forcing a failure. [ 751.394360][ T6177] name failslab, interval 1, probability 0, space 0, times 0 [ 751.438372][ T6177] CPU: 1 PID: 6177 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 751.447579][ T6177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.457666][ T6177] Call Trace: [ 751.460993][ T6177] dump_stack+0x172/0x1f0 [ 751.465368][ T6177] should_fail.cold+0xa/0x15 [ 751.473828][ T6177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 751.479951][ T6177] ? ___might_sleep+0x163/0x280 16:31:16 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea04efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:16 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 751.484881][ T6177] __should_failslab+0x121/0x190 [ 751.489996][ T6177] should_failslab+0x9/0x14 [ 751.490014][ T6177] kmem_cache_alloc_trace+0x2d1/0x760 [ 751.490039][ T6177] ? lock_downgrade+0x880/0x880 [ 751.504973][ T6177] alloc_fdtable+0x86/0x290 [ 751.509500][ T6177] dup_fd+0x743/0xb30 [ 751.513518][ T6177] unshare_fd+0x160/0x1d0 [ 751.513539][ T6177] ? pidfd_release+0x50/0x50 [ 751.513556][ T6177] ? cache_grow_end+0xa4/0x190 [ 751.513580][ T6177] unshare_files+0x7f/0x1f0 [ 751.513603][ T6177] ? __ia32_sys_unshare+0x40/0x40 [ 751.537105][ T6177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.537124][ T6177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.537147][ T6177] __do_execve_file.isra.0+0x27e/0x22f0 [ 751.537176][ T6177] ? __check_object_size+0x3d/0x42f [ 751.537199][ T6177] ? copy_strings_kernel+0x110/0x110 [ 751.556020][ T6177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.556039][ T6177] ? getname_flags+0x277/0x5b0 16:31:16 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0xfffffffffffffffc, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") [ 751.556058][ T6177] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.556077][ T6177] __x64_sys_execve+0x8f/0xc0 [ 751.556099][ T6177] do_syscall_64+0x103/0x670 [ 751.556117][ T6177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.556130][ T6177] RIP: 0033:0x458da9 [ 751.556146][ T6177] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 751.556165][ T6177] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 16:31:16 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea05efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 751.629748][ T6177] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 751.629758][ T6177] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 751.629765][ T6177] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 751.629772][ T6177] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 751.629779][ T6177] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:16 executing program 0 (fault-call:5 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:16 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:16 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:16 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea0fefc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 751.943153][ T6415] FAULT_INJECTION: forcing a failure. [ 751.943153][ T6415] name failslab, interval 1, probability 0, space 0, times 0 16:31:16 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea10efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 751.984498][ T6415] CPU: 0 PID: 6415 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 751.993667][ T6415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.003825][ T6415] Call Trace: [ 752.003857][ T6415] dump_stack+0x172/0x1f0 [ 752.003886][ T6415] should_fail.cold+0xa/0x15 [ 752.011521][ T6415] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 752.011546][ T6415] ? ___might_sleep+0x163/0x280 [ 752.011569][ T6415] __should_failslab+0x121/0x190 16:31:16 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1020fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 752.011593][ T6415] should_failslab+0x9/0x14 [ 752.036559][ T6415] kmem_cache_alloc_node_trace+0x270/0x720 [ 752.042406][ T6415] __kmalloc_node+0x3d/0x70 [ 752.046934][ T6415] kvmalloc_node+0x68/0x100 [ 752.051822][ T6415] alloc_fdtable+0xd6/0x290 [ 752.056535][ T6415] dup_fd+0x743/0xb30 [ 752.060579][ T6415] unshare_fd+0x160/0x1d0 [ 752.064927][ T6415] ? pidfd_release+0x50/0x50 [ 752.069646][ T6415] ? cache_grow_end+0xa4/0x190 [ 752.074445][ T6415] unshare_files+0x7f/0x1f0 [ 752.078969][ T6415] ? __ia32_sys_unshare+0x40/0x40 [ 752.084012][ T6415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.090474][ T6415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.090498][ T6415] __do_execve_file.isra.0+0x27e/0x22f0 [ 752.090523][ T6415] ? __check_object_size+0x3d/0x42f [ 752.107692][ T6415] ? copy_strings_kernel+0x110/0x110 [ 752.107716][ T6415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.107733][ T6415] ? getname_flags+0x277/0x5b0 [ 752.107751][ T6415] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.107770][ T6415] __x64_sys_execve+0x8f/0xc0 [ 752.107792][ T6415] do_syscall_64+0x103/0x670 [ 752.107812][ T6415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.107848][ T6415] RIP: 0033:0x458da9 [ 752.161970][ T6415] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:31:16 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1030fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:16 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 752.185569][ T6415] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 752.194001][ T6415] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 752.201994][ T6415] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 752.209975][ T6415] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 752.209985][ T6415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 752.209994][ T6415] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:17 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000900)="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") fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000140)) 16:31:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:17 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:17 executing program 0 (fault-call:5 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:17 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1040fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 752.610725][ T6554] FAULT_INJECTION: forcing a failure. [ 752.610725][ T6554] name failslab, interval 1, probability 0, space 0, times 0 [ 752.670591][ T6554] CPU: 0 PID: 6554 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 752.679762][ T6554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.689840][ T6554] Call Trace: [ 752.693166][ T6554] dump_stack+0x172/0x1f0 [ 752.697533][ T6554] should_fail.cold+0xa/0x15 [ 752.702157][ T6554] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 752.707994][ T6554] ? ___might_sleep+0x163/0x280 [ 752.712869][ T6554] __should_failslab+0x121/0x190 [ 752.717870][ T6554] should_failslab+0x9/0x14 [ 752.722410][ T6554] kmem_cache_alloc_node_trace+0x270/0x720 [ 752.728237][ T6554] ? kasan_unpoison_shadow+0x35/0x50 [ 752.733548][ T6554] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 752.739385][ T6554] __kmalloc_node+0x3d/0x70 [ 752.743919][ T6554] kvmalloc_node+0x68/0x100 [ 752.748445][ T6554] alloc_fdtable+0x142/0x290 [ 752.753050][ T6554] dup_fd+0x743/0xb30 [ 752.757064][ T6554] unshare_fd+0x160/0x1d0 [ 752.761414][ T6554] ? pidfd_release+0x50/0x50 [ 752.766024][ T6554] ? cache_grow_end+0xa4/0x190 [ 752.770818][ T6554] unshare_files+0x7f/0x1f0 [ 752.775349][ T6554] ? __ia32_sys_unshare+0x40/0x40 [ 752.775371][ T6554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.775388][ T6554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.775416][ T6554] __do_execve_file.isra.0+0x27e/0x22f0 [ 752.775434][ T6554] ? __check_object_size+0x3d/0x42f [ 752.775455][ T6554] ? copy_strings_kernel+0x110/0x110 [ 752.786782][ T6554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.786800][ T6554] ? getname_flags+0x277/0x5b0 [ 752.786819][ T6554] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.786837][ T6554] __x64_sys_execve+0x8f/0xc0 [ 752.786858][ T6554] do_syscall_64+0x103/0x670 [ 752.786877][ T6554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.786899][ T6554] RIP: 0033:0x458da9 [ 752.841343][ T6554] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:31:17 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:17 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:17 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1050fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:17 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x20280, 0x0) syz_execute_func(&(0x7f0000000000)="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") tee(r0, r0, 0x0, 0x7) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) 16:31:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 752.841353][ T6554] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 752.841368][ T6554] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 752.841376][ T6554] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 752.841400][ T6554] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 752.864932][ T6554] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 752.864941][ T6554] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:17 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:17 executing program 0 (fault-call:5 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:17 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1060fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:17 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x5) syz_execute_func(&(0x7f0000000180)="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") ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) sched_rr_get_interval(r1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000140)="c4e18bc27d00a68f0978d671ba8fa878c147dacb8fea481245f47d52ffffc4217c50e067470d00000000c4a281aed26641f7954719da9fe400f3a7") 16:31:17 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 753.089786][ T6793] FAULT_INJECTION: forcing a failure. [ 753.089786][ T6793] name failslab, interval 1, probability 0, space 0, times 0 16:31:17 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1070fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 753.285255][ T6793] CPU: 1 PID: 6793 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 753.296064][ T6793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.306145][ T6793] Call Trace: [ 753.309564][ T6793] dump_stack+0x172/0x1f0 [ 753.314109][ T6793] should_fail.cold+0xa/0x15 [ 753.318748][ T6793] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 753.324591][ T6793] ? ___might_sleep+0x163/0x280 [ 753.329465][ T6793] __should_failslab+0x121/0x190 [ 753.334436][ T6793] should_failslab+0x9/0x14 [ 753.338951][ T6793] kmem_cache_alloc_trace+0x2d1/0x760 [ 753.344353][ T6793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.350695][ T6793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.356963][ T6793] __do_execve_file.isra.0+0x325/0x22f0 [ 753.362539][ T6793] ? __check_object_size+0x3d/0x42f [ 753.367769][ T6793] ? copy_strings_kernel+0x110/0x110 [ 753.373081][ T6793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.379538][ T6793] ? getname_flags+0x277/0x5b0 [ 753.386348][ T6793] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.392620][ T6793] __x64_sys_execve+0x8f/0xc0 [ 753.397431][ T6793] do_syscall_64+0x103/0x670 [ 753.402048][ T6793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.408250][ T6793] RIP: 0033:0x458da9 [ 753.412165][ T6793] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 753.432331][ T6793] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 753.440782][ T6793] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 753.448910][ T6793] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 753.456990][ T6793] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 753.464996][ T6793] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 753.473058][ T6793] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:18 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:18 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:18 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0xa0200, 0x0) 16:31:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:18 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1080fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:18 executing program 0 (fault-call:5 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:18 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:18 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 753.817668][ T6935] FAULT_INJECTION: forcing a failure. [ 753.817668][ T6935] name failslab, interval 1, probability 0, space 0, times 0 [ 753.888069][ T6935] CPU: 0 PID: 6935 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 753.897156][ T6935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.907364][ T6935] Call Trace: [ 753.910696][ T6935] dump_stack+0x172/0x1f0 [ 753.915072][ T6935] should_fail.cold+0xa/0x15 [ 753.919796][ T6935] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 753.925651][ T6935] ? ___might_sleep+0x163/0x280 [ 753.930573][ T6935] __should_failslab+0x121/0x190 [ 753.935544][ T6935] should_failslab+0x9/0x14 [ 753.940244][ T6935] __kmalloc+0x2dc/0x740 [ 753.944532][ T6935] ? refcount_inc_not_zero_checked+0x144/0x200 [ 753.950723][ T6935] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 753.959011][ T6935] ? security_prepare_creds+0x123/0x190 [ 753.964614][ T6935] security_prepare_creds+0x123/0x190 [ 753.970067][ T6935] prepare_creds+0x2f5/0x3f0 [ 753.974687][ T6935] prepare_exec_creds+0x12/0xf0 [ 753.979567][ T6935] __do_execve_file.isra.0+0x393/0x22f0 [ 753.985223][ T6935] ? __check_object_size+0x3d/0x42f [ 753.990462][ T6935] ? copy_strings_kernel+0x110/0x110 [ 753.995781][ T6935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.002051][ T6935] ? getname_flags+0x277/0x5b0 [ 754.006943][ T6935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.013045][ T6935] __x64_sys_execve+0x8f/0xc0 [ 754.017782][ T6935] do_syscall_64+0x103/0x670 [ 754.022426][ T6935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.028443][ T6935] RIP: 0033:0x458da9 [ 754.032366][ T6935] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 754.052268][ T6935] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 754.060755][ T6935] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 754.068757][ T6935] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 754.076763][ T6935] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 16:31:18 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:18 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x1, 0x0) syz_execute_func(&(0x7f0000001d40)="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") r1 = getpgid(0xffffffffffffffff) r2 = getuid() stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f00000018c0)=[{&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000001c0)="66fd45e45ce86c52ff2e2c64724ae0968c4d21f28eddd7320a91", 0x1a}, {&(0x7f0000000200)="c309fa8b6c90f3414199c2ca7f9512e2d770f5d1ba92478d50bdfa3f70cfc904bb8ef6ffa9bb4ebb3c9ff74a89f108b2a7b710ede6bbfc24510a2c4e61ae9f5a8bab624b73554b9831a7c4fb9b1f1766b6cc8c93cd519dcdd0572c38bd6bc52cbe99afaa22f6eb38077dc665d1fb0172063d840dbb73adb8a8dc4de0fb1409fa4410bd997223ac9df624560f629cad5755b8b50bae2071848acaebe37b51647f2832769a2755258d05de96098cef2dd9b941868b18e9b5d08af9aba016d1a891d5bb851fa5ecaf3d50d6623739dcfa882af4b0259701b0b077565ec074209c9370f79bef9bdd95c8a060a573036eba63507d7185acff5f2be8787712b932035eb9dd36a195a4eb3fd8a46b380e679fe00ae4e28aff21932adc84a5f3e6d4cf00c175cb1a9c605c63d632b682bd5e3eec28051181a701c120e4860add8083048466e0c6ce666933b12d0042fb842a34b0bfe5f98464f36ef0b639ef10b074ea491c088d40a74c60547876c8e014fe5c80d6632fee1c706698f9fe8dfb7d63a14a6117629704771a5e41dfad2059252f49cfac941376bd546cacb0fecaf057fcecdbe73af4d5ca71cf4dec8f1bd843c244036aab319eff2e81bb9f43b69673b4b3c659500687b9d293ca771263a3b371acfb107608526660b01bb6de5c92f70f6fe7a8709848a49b42ab48bd0c8385ee6ce9dd11087511c122bcb4b3a2d2852bd5ce739852707ad19d947e48e12236fcf9bf17f2fea1b9e667dad9baea95759c0c004ba781f1a31b37d0b147c597e757648ad4710d6ec35e7ee9f37b8a9eed6e5abc426b0ec78c5da98c36853909e4f64f65fc6d14f059f71188600ad33feebaf7baba7066145835b08979046ea5c357c2ba12da47d3efd9b01172b639afdd03180fcc62d8a96a2ba238f04916ec8516490271044852019c6c696e2e0fcff880baf431f70769c255851471ab9ae908bdb2b8687b0846729741267a244d869d7080deb215cd28893835fe810414b297e5baf04b660b7a35717b6f18570e77acadb6bdb9a9e92bfe0456d472c541f8404f65289db41eb9b928260c972c385de805179e6078395d9a9fc60053bd3f92005ee51654feb03c254a5b973f1e5fb2cbc8d2b5453697ea50f6373e3d10f3c690fec701b0703f83a154928d2e71bce5337ac75b26c30dea048cfedf8e667ef95850bfd82ec7180e27b7462104493f6b0d42af2d9b9e02b8dc98d0b5f398193bdfcec5dc9c447087a78311342f6ceb4375c41838852d77a82f52b0e2c7f47397eec92b1d204e0ada6b8b102843cdc99af10a7c29c8406bb186b2c96cab69b23a03a93f9feeb65cfbd7b20cbf03815b0ed451dabb45a92354a6c710b8ef5a384ce31d47e40ea1313e8e2231348b7d817853e246d253e26a839493b35a1d39b034a6f67c6251cd1fa7806ab007d33db598f42c2b4c629189e92a8976129cb2047c202d08814a9117388b1b5a66440953b347b3253e675b86690eb815d2aaa2c1122478c3e22c4d88fe4b0112ed1d99a3ebd600e66f7149b9e31ee400db4b3af441d4a063a56d2e391fab2649b292313904242e1f3270803792dfc54bc46ae56c76680702c7209a3fbc9f4473a96fde2e8fd8eccf11841e3613a3df53c27cf403d29ad94eeda9939b3b06ae3ba35e5292610549866d892e169638141747ae7cd7ae9040707996dc30c5a9973a29767fa8a0f4fb63fa1054cbb530873c86c372271f66960cec968d7c122d56d8826f280a164ffb2d1447e74b9b6a315b227da269078f9de4b7d69b356b2001fd21892c08a9b461ebae5a5936e2fd067f22b26e26bd56a6e593c86ad7fc806caff137e939a1eda00bba9718baa171c11adc6b59bbeb9802a470a473d6bbda89282d2ab81a6dbfda357d8b15798602a2d584b35e91e33b3c2883239002720c45f197078398dd47eb3ec31da68bd4be72279c70d2c339630a44743121bd5ddd3b5c8be2c998383e3abc47feb78590b2d782b0b963a5bf8d9fee8082c3a2d868366d813338da374c613575b0b67da0c8058dca0add4bebb1c522b435a13d3d4d7e361c91ede8e4f1406e0b1799950d5e794d2ec290bb886fbad7003e80db733841bc6bf2aeb59de37fcf911a0d35ac64de39a077e2bff8df7b194d6251c1b6277a599ef0473d5b120bc6adf7424dbc1ee96da98a3b660c52f401d964b6540d940ac583a30e7dfb0f31622b3cebbe7ec390259f4c6f361cbf3484195bc85649c3a2f5a659edd20fcdded4f7530ff66a4f8ee44566dbecc1643b3d874aaabdf9f1b3a9a9c168f7860f66898b15ad792dfc83578d4a0b00b80b4f6d895535df17f019d96ba6c4850aec8848abcfb78acb16f20e062ea3dbbcb0011ce89486b6d091c5c49f495c4f7cbf730f5fc93ba6c1bc6811b8bc287aaed7b007a2a4ead529c611b820fb43e17019d1f792356d331c029942a002fd6450ebf3078ea657563551d122bd0cf01f94743ecb5c1f75947f528b043860f6814f76326c7824b5483c5ba08297f30a44c54166e9a27c79e7f9cb3ec2081ac7f5ce9b82855d892808f6545812e42933dc5a08b6ee112d2f6b8495d19089f5cb2de3921b1ef8b8b9fdecd49b1394c756858618ec48cc00a664c07a1ec57349c3f561acb296ab92897b166c4cb06d716f85a1224fea97e0808cbaff71d55c17e8264d2df5f951f5eda9fa9aac748e7783aded59160904a110d650d80af644c562af1d0c90f9ed1ea57265553e2038be48119a97e67fa7fe0d0db872674a77fedb3f8ab8e7f633f0cbaeb306adff183c5506c19a167425482fbe949ceeae28f2be7c447b5e4528b4f2ca11575f2424699a35a28aa83a05462be7090cd382dc20b1afac3362be4d1fc14dfcb5bf0d38703a2ecdb1aba81d2fa2561041e96a8c743ff6f68a631a1e44b9b63577015b53f602ace60e098e9df71f356670a187d574e4bb4b15e0b62d9209a2a3c6513d8338ab68116361ad3805ee6562cb0d3c8a77864f65013139ab1dc15c8b3ad4bcb5ba861e086c735f8dede0469900d9f63aa9d77cd89523284e4e358e21c5c5f4796a94e4357f8f20353cb46b6d8abf4bc1feada06c22de3065ccf75999f3ceb1503297727dfce1874dfd1510c1f439848714ab0a75d6d46ec952bb07ff6c1c100ce0f5614ff041720be16af9aa375e3b4a243c0e1110079fca5a2847aeae765955ed78c969ccc30a14e03ebee003656552c74557e6a4a690cf8cfcfc78ced173cc386f2d6f1f43c28788c5820a64c678c961ebe8067eb94e4c0805cc1d22f90965cf56b00fc782f6508b78d6b9ceb9a15d515a5298da169834f44d548738935e93c594783089e03cd5a22688f52fcb8a9d7ab9fbdf43cfdad2ee4d2ac0024da52f95bb4c91ccead4b62504bb28cafddcd77caf54ba8af2d0e9b6f6d79af213be1f6e8632848e8335567eb9ba24f3554eea44987876509d87d9ee39a13f099e5412178433b9586baa300c30b7d3b8b841fa1427f81f2f928c1ad7782c7c0ea4a7f5f69a4d2cc4c06b4f4ade750670427828f406438f45e99268f88b649356acecb2ced12a67281a0c41da307820b9a4bb1fb89c96d6fac6b129ba52a3141f249e249bd9dfeecd234d8edd9ab56fdf184971a778f9e5561577b253377988b764dfb41f67ac821df2de977bc69a690bd122fc244c9a2b6e0caaaa4356892d19f2de0bf787fcdc40141cde60db56615bba6f7f457540ac92472d5b97ef223eb43c03fad7a887ac8beced0a74445e6ca96dd91a6e8bb1d6f5e608196fdb3932292550d2d9299663c4198fc708ec5c473c79e833032ad1476445b0c75f215d807530d88795ada9dbd8fdd58cc8549b6c4d4529cc9966ea34eb9216c7f268bcf2a8756dfb81322f65928e1f7afa1d122c5605df50cd7272e250ed0fb984d8003bcb65bbe2bdd93bc21e651fce1d64f8ef53a16deb606f3e4c46587fd93833ca6cee6bf5edb62a1a92b78213ae3ecb14984ea3abb3d0a54eb6c33bec9f49e499218bf0242a6609c8ea27c921581d4ce1b0e6f2af04f12d79bc8abdbc39bfc37548df65270f74edb667ef78218be901378d937e44a6504f6da183d0e4a9da5c542432ce86a8ef72e460f054cfb62119f987052d0564e5bfaf0566d938f51041618165b3d3a9701e9b7958ec379491459507eccb82a22c2cc170795c4e83145d7394da9b0daec77c5a5b28a01b52ede8178c4cffcd5340908cedabb2cfc3daf2159ebaf274be88e5f8b61fbf483bccae9086ef844ceaabd6edba576377d670d1b8043f15244dd600f7016685438e733efcf3901a4f007b354f8c5fa53f0e08bea3018da8b4846f932896b7f0898b0aef0783242f660914ae4a4a24439ceb276a48233cf599a24d1dd213762e8a367ebfea0a6403191930a9980dd3b9311ae381e0385cd3a57dd61b94a1d796fe966a38e32fed9b84dfac0ac3b02ea0a1dbde8d1656b132a3e07f303d3ac4d05fc1438fcb343c7c402e20e9583b75670723ed9aa2b1ebe4e125cc9242cdf74470b4bcaaab6d5288aff7f50b490a8503977aea1b73aefacad77a2929090185963aae5f6bbecf4f4a1b52230828eca355fbb2420f27ccc84ffaa4fcc73d17d998bd4408395ebf0b930ce24a3abced9d28d8b81706e0baab405626134239b2d3e62b80c2cd19f47e27492877a8485b46164ca3afd1bf722469a1e5ad2411278a35320763a42bf146b7754deb5ac81329ceb87cf4c6e1aff8912be73b4414dcd944be970839979f281b466715bf00220186e80e0f7ffab66f1fe6d6f26c6cb673f3884e7edb7133dac9bf05ec1468dbf9567036ca34a4d19ae2883a0ac69d7b32414fe0a7f32564fa5de67485cee70175b170a9a5ddb1562560a6a737e9d37f0497bf246fcf4b88a49ae9d252454fcc8ab47e307731f28bd2799724e4ab723882a68e807c22a8072d3f7028c996cb8cd2693f150ab38ff09dd6f20ac508681841730c1dcc3b972cf9ceb4e064abcda3f1118ecd866abac472df3d7d01e6b315d9d4bc6afead0ecd862de28352d4b3b30e226a40dd3662f4908bd510a4d10470fb62693a8cc75e0b72f2bce2763a12bcda59f80dfa7842e5e3bb75fd33e310e8d3720a852a854cd133457cd7be29fe6b40511a2e68c13ed6b44d691d680cc166a845145c4d0c738bd0bf20620c41f9cb5cb201900d22ddfedc8e4e2e9915aa20cb82e27a26d1b7c80100eb9de95411c1becf2c774bef1661599400349258e25e3000e8ee6990e8155a3e79d651d0f6a73936b2a2a65007a85c4918bfeee7e62663894ae8685a61e0265759442fa85ca0d924826c0d92795a3ad11ff05807d1905d312b82a4d6e8cb6dde0513f31d43de7f4996f9b76eed8210daf38172a779c4e862c54a7731d70d4c22d632884af03818704fa785725c08975da80bad5bd5384949d0c9ab9b05b13eabdef919cdbea7c6f715ab4ab393265b6d97b8aab352ec55989e014658374e79f09dc037efd0ad10ac2b228b0b40f8118a6b8f19f8dbd2526cd1ddfb81b5bdfefd76e1c5b068087df5e9c42d0d7f97f472a4ce871d6983008fba6534391323b651dc3a886229d4ee84fed7410880b05a2de827e1fe31ea067d6635b1e28e3f7d9ffb15f4927ae3e4180ef86d6346583541156c43bd866a9ac184307e1783e1721b4f05d356c2df7dd4c0141c0c2cfbc2af92630bcc238ee22905296033f673b82045a5bf40084741cddbd060562c0d2c13853cfdc79d48753f6e05c903f7911dfaad46c6c274037866923d7c6abdaa86e447bbdefb8373dfa7f0", 0x1000}, {&(0x7f0000001200)="7a8a47088571a278e8a7a2885edb7d3a8ca38831b5a30281e6001bd314e1e7e1df8cf5104efb64775743fde36524", 0x2e}, {&(0x7f0000001240)="aa2db66d9ea6eb04aa82cc1629d09ad8c625f40ebe63ccabeaf4bcacaf", 0x1d}, {&(0x7f0000001280)="4649d40e1bb3ca21636ae62f758b8c19f189b1551a0899da44dcf99cb4dd771ff7df2b4e0f1d994afc46f90a285d8dd9b4f6d604a650e06a723b20accff6f0b9438de6bd6422b5f92328f8755c04e0ef171755a322ae3c88e31c9c5292535b165f70c04ae81a7e768e62604ee6e6d4d52efbae4c7cb8", 0x76}], 0x5}, {&(0x7f0000001380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001640)=[{&(0x7f0000001400)="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", 0xfd}, {&(0x7f0000001500)="e907945fc4455133a8b612f004cd496a7885825156222aa8a7a0a1c861122d93935d09980358602cd9b11d6f2a3a8cf2ef8c65ab4dd86b08c4d80d929443334487ca7e869e8c743155b640d5a10cb81e80bb4a12b49e6b5ade73330d06ca42715e8ed5a5b7b796cf476681eb1430578317e1b5a63800aa4813ee", 0x7a}, {&(0x7f0000001580)="bfc8f16d0a03c50b9d3ec916b6ea79a83fa33402", 0x14}, {&(0x7f00000015c0)="92a00393d7bc98e6a6cbcfa9cf728dbb7062795a09aba884ad1ccf77259f831342a066e52ac0f34f541b93720498c827bf9bec2f0c63abdf4d20c9ea4a16a7798bbc1205c7f2f78b501e7b4d35ee285c4788482f82750295dfd62cc41a5c9c82108bdffdeb5e5ef8005c196c9440995f1c89941dc81b7b06608b260ee45b", 0x7e}], 0x4, &(0x7f0000001740)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x20, 0x8000}, {&(0x7f0000001780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001840)=[{&(0x7f0000001800)="deb913550b697defc5fa33bf40ddf3d4bbdf10fb4fd26a288e27efa5ebc6a5bef82a", 0x22}], 0x1, &(0x7f0000001880)=[@rights={0x18, 0x1, 0x1, [r0, r0]}], 0x18, 0x10}], 0x3, 0x1) 16:31:18 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1090fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:18 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:18 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 754.084762][ T6935] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 754.093017][ T6935] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:18 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x836, 0x410000) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000180)={{0x1, @addr=0x3}, 0x8, 0x9}) syz_execute_func(&(0x7f0000000000)="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") sendmsg$inet_sctp(r0, &(0x7f0000000540)={&(0x7f00000001c0)=@in={0x2, 0x4e24, @rand_addr=0x3ab4000000000}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000200)="e5e8efa52d47c1307c7abbdab3c0386a1cab837b48741b97c4d82aa5ea51a87162133b0fea6ed98d5e995dce9050fd8a2226c50e4fb9910d8ae55667caecd379234da1d996c3c673e382de3f0a5998f9a1a654682e21ec25706a94e9cd1055e8f8e618980b6df131a14d91d19bbc51613c5d61a08a85b8abcfabcd0b5041f24e3c503792a1b35e2ba538d3885a6f15f5f030dccddd45ef6dc1eaa4dedb73f51e0cfab53fe526c26df2d78f690d7e47ec670a98", 0xb3}, {&(0x7f00000002c0)="b6023c72359ae6be36d9254ed0bdf530b9833e3de398bedc0d0377dee8ad628aea2921d65f4cd9ba0b681bbb128b7c833fcf56cb27cd5d7bb8e3d8c2b4b6d49af778f960a07b16a8a768e2c9964f93a8fe36697469681ac40dc6b9acdae6317d663c7db268e436fb4881999f218510274a475cdf34c627fadc876e4d719a07ebcbf2f9f2d9f72eadda92a8eb424115b044b81c6e40991dd6800ebb1039e5d2442b", 0xa1}, {&(0x7f0000000380)="1e8cbad00cbf0438650c5f9ba5ad8f8ce20e90b8a601a43b203a77c480463c0acb819795f010a11a50365c6995b4fba215f59a7830983903f6f58bcb2d688461f2d6fe296915a9", 0x47}, {&(0x7f0000000400)="a7d522c6a3a11fb1db633f02858795f7f68ad620725ec6fde202b2e075fa0189fd5b2dd905c93cd800c0c8325a7719e20e67b7719a7c859e0f47735f6c11af26d38ddb763e2a0c1b8b62f7bdb7d9b5251e92f2ff7c0a316d149f9aae8dcc5742ad0ee5fca28f825315b103df81b5461dc974b239385ab4b3d51aa814f1cf28be058af56d2a3cd1b28d25bcfae87c96f6a81006f0d0a6296ddea4ee", 0x9b}], 0x4, &(0x7f0000000500)=[@init={0x18, 0x84, 0x0, {0x8, 0x2, 0x7, 0x20}}], 0x18, 0x4}, 0x4000040) 16:31:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:18 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:18 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f10a0fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:18 executing program 0 (fault-call:5 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:18 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 754.352355][ T7173] FAULT_INJECTION: forcing a failure. [ 754.352355][ T7173] name failslab, interval 1, probability 0, space 0, times 0 [ 754.409522][ T7173] CPU: 1 PID: 7173 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 754.418601][ T7173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.428672][ T7173] Call Trace: [ 754.431985][ T7173] dump_stack+0x172/0x1f0 [ 754.436359][ T7173] should_fail.cold+0xa/0x15 [ 754.440985][ T7173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 754.446844][ T7173] ? ___might_sleep+0x163/0x280 [ 754.446881][ T7173] __should_failslab+0x121/0x190 [ 754.446913][ T7173] should_failslab+0x9/0x14 [ 754.456726][ T7173] __kmalloc+0x2dc/0x740 [ 754.456746][ T7173] ? refcount_inc_not_zero_checked+0x144/0x200 [ 754.456763][ T7173] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 754.456782][ T7173] ? security_prepare_creds+0x123/0x190 [ 754.456801][ T7173] security_prepare_creds+0x123/0x190 [ 754.456823][ T7173] prepare_creds+0x2f5/0x3f0 [ 754.456842][ T7173] prepare_exec_creds+0x12/0xf0 [ 754.456860][ T7173] __do_execve_file.isra.0+0x393/0x22f0 [ 754.456901][ T7173] ? __check_object_size+0x3d/0x42f [ 754.456924][ T7173] ? copy_strings_kernel+0x110/0x110 [ 754.503537][ T7173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.520406][ T7173] ? getname_flags+0x277/0x5b0 [ 754.525194][ T7173] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.531282][ T7173] __x64_sys_execve+0x8f/0xc0 [ 754.535987][ T7173] do_syscall_64+0x103/0x670 [ 754.540600][ T7173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.547463][ T7173] RIP: 0033:0x458da9 [ 754.551372][ T7173] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 754.571086][ T7173] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 754.580297][ T7173] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 754.589003][ T7173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 754.597007][ T7173] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 16:31:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:19 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:19 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f10b0fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:19 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200000000001, 0x0) syz_execute_func(&(0x7f0000000140)="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") [ 754.605031][ T7173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 754.613032][ T7173] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:19 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:19 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:19 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f10c0fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:19 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:19 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:19 executing program 0 (fault-call:5 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:19 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:19 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f14010ae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:19 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0805bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") [ 755.083958][ T7336] FAULT_INJECTION: forcing a failure. [ 755.083958][ T7336] name failslab, interval 1, probability 0, space 0, times 0 [ 755.097409][ T7336] CPU: 0 PID: 7336 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 755.106451][ T7336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.116533][ T7336] Call Trace: [ 755.119854][ T7336] dump_stack+0x172/0x1f0 [ 755.124214][ T7336] should_fail.cold+0xa/0x15 [ 755.128818][ T7336] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 755.134635][ T7336] ? ___might_sleep+0x163/0x280 [ 755.139760][ T7336] __should_failslab+0x121/0x190 [ 755.144713][ T7336] should_failslab+0x9/0x14 [ 755.149254][ T7336] kmem_cache_alloc+0x2b2/0x6f0 [ 755.154136][ T7336] ? __kernel_text_address+0xd/0x40 [ 755.159376][ T7336] ? unwind_get_return_address+0x61/0xa0 [ 755.165125][ T7336] ? profile_setup.cold+0xbb/0xbb [ 755.170184][ T7336] __alloc_file+0x27/0x300 [ 755.174726][ T7336] alloc_empty_file+0x72/0x170 [ 755.179923][ T7336] path_openat+0xef/0x46e0 [ 755.184400][ T7336] ? stack_trace_consume_entry+0x190/0x190 [ 755.190254][ T7336] ? save_stack+0x5c/0x90 [ 755.194620][ T7336] ? save_stack+0x23/0x90 [ 755.198970][ T7336] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 755.204365][ T7336] ? security_prepare_creds+0x123/0x190 [ 755.209944][ T7336] ? prepare_creds+0x2f5/0x3f0 [ 755.214917][ T7336] ? prepare_exec_creds+0x12/0xf0 [ 755.219963][ T7336] ? __do_execve_file.isra.0+0x393/0x22f0 [ 755.225731][ T7336] ? __x64_sys_execve+0x8f/0xc0 [ 755.230594][ T7336] ? do_syscall_64+0x103/0x670 [ 755.235367][ T7336] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.241449][ T7336] ? save_stack+0x23/0x90 [ 755.245788][ T7336] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 755.251727][ T7336] do_filp_open+0x1a1/0x280 [ 755.256251][ T7336] ? may_open_dev+0x100/0x100 [ 755.260952][ T7336] ? __lock_acquire+0x54f/0x5490 [ 755.265916][ T7336] ? mark_held_locks+0xf0/0xf0 [ 755.270724][ T7336] ? __do_execve_file.isra.0+0x7cc/0x22f0 [ 755.276460][ T7336] do_open_execat+0x137/0x690 [ 755.281161][ T7336] ? unregister_binfmt+0x170/0x170 [ 755.286298][ T7336] ? lock_downgrade+0x880/0x880 [ 755.292955][ T7336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.299228][ T7336] ? kasan_check_read+0x11/0x20 [ 755.304125][ T7336] ? do_raw_spin_unlock+0x57/0x270 [ 755.309268][ T7336] __do_execve_file.isra.0+0x16e9/0x22f0 [ 755.314937][ T7336] ? copy_strings_kernel+0x110/0x110 [ 755.320252][ T7336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.326519][ T7336] ? getname_flags+0x277/0x5b0 [ 755.331399][ T7336] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.337504][ T7336] __x64_sys_execve+0x8f/0xc0 [ 755.342218][ T7336] do_syscall_64+0x103/0x670 [ 755.347279][ T7336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.357195][ T7336] RIP: 0033:0x458da9 [ 755.361223][ T7336] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:31:20 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e4610569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 755.381288][ T7336] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 755.389729][ T7336] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 755.398160][ T7336] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 755.406236][ T7336] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 755.414319][ T7336] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 755.422318][ T7336] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:20 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:20 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:20 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f020000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:20 executing program 3: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x7fff, 0x123000) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@initdev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000640)=0xe8) getsockname$packet(r1, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000780)=0x14) getsockname$packet(r1, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000a40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000003000)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000003600)={0x0, @multicast2, @broadcast}, &(0x7f0000003640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003680)={{{@in6=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000003780)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000003b00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x44004}, 0xc, &(0x7f0000003ac0)={&(0x7f00000037c0)={0x2dc, r2, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffff8000}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x3ac, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x0, 0x1, 'mcast_rejoin_count\x00'}, {}, {0x0, 0x4, 0x8}}}, {0xc2, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r7}, {0x13c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffb}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r11}}}]}}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x8050}, 0x4004000) socket$l2tp(0x18, 0x1, 0x1) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000200)={'bridge_slave_1\x00', 0x400}) syz_execute_func(&(0x7f0000000000)="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") 16:31:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:20 executing program 0 (fault-call:5 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:20 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:20 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f040000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:20 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 755.684781][ T7458] FAULT_INJECTION: forcing a failure. [ 755.684781][ T7458] name failslab, interval 1, probability 0, space 0, times 0 [ 755.740062][ T7458] CPU: 1 PID: 7458 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 755.749244][ T7458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.759971][ T7458] Call Trace: [ 755.763335][ T7458] dump_stack+0x172/0x1f0 [ 755.768004][ T7458] should_fail.cold+0xa/0x15 [ 755.773849][ T7458] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 755.779706][ T7458] ? ___might_sleep+0x163/0x280 [ 755.784602][ T7458] __should_failslab+0x121/0x190 [ 755.789591][ T7458] should_failslab+0x9/0x14 [ 755.794130][ T7458] kmem_cache_alloc+0x2b2/0x6f0 [ 755.799020][ T7458] ? nr_iowait+0x130/0x130 [ 755.803636][ T7458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.809998][ T7458] mm_alloc+0x1d/0xd0 [ 755.814010][ T7458] __do_execve_file.isra.0+0xa73/0x22f0 [ 755.819593][ T7458] ? copy_strings_kernel+0x110/0x110 [ 755.824924][ T7458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.831207][ T7458] ? getname_flags+0x277/0x5b0 [ 755.836000][ T7458] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.842130][ T7458] __x64_sys_execve+0x8f/0xc0 [ 755.846835][ T7458] do_syscall_64+0x103/0x670 [ 755.851452][ T7458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.857366][ T7458] RIP: 0033:0x458da9 [ 755.861280][ T7458] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.880921][ T7458] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 16:31:20 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180)=0x822, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0xffffffff}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0xffffffffffffff00, 0x7, [0x1, 0x7, 0x0, 0x1, 0x51a, 0xffff, 0x7]}, 0x16) syz_execute_func(&(0x7f0000000000)="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") 16:31:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:20 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964cf005bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") [ 755.889359][ T7458] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 755.897361][ T7458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 755.905354][ T7458] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 755.905363][ T7458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 755.905370][ T7458] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:20 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:20 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f060000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:20 executing program 0 (fault-call:5 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:20 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:20 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x240, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0xfffffffffffffff8) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") mq_timedsend(r0, &(0x7f0000000140)="3fe8c6d4c17b", 0x6, 0x8, &(0x7f0000000180)={0x0, 0x1c9c380}) 16:31:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:20 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 756.190912][ T7500] FAULT_INJECTION: forcing a failure. [ 756.190912][ T7500] name failslab, interval 1, probability 0, space 0, times 0 [ 756.235524][ T7500] CPU: 0 PID: 7500 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 756.244832][ T7500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.254915][ T7500] Call Trace: [ 756.258250][ T7500] dump_stack+0x172/0x1f0 [ 756.262721][ T7500] should_fail.cold+0xa/0x15 [ 756.267388][ T7500] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 756.273886][ T7500] ? ___might_sleep+0x163/0x280 [ 756.278867][ T7500] __should_failslab+0x121/0x190 [ 756.283841][ T7500] should_failslab+0x9/0x14 [ 756.288371][ T7500] kmem_cache_alloc+0x2b2/0x6f0 [ 756.288390][ T7500] ? nr_iowait+0x130/0x130 [ 756.288416][ T7500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.288438][ T7500] mm_alloc+0x1d/0xd0 [ 756.288462][ T7500] __do_execve_file.isra.0+0xa73/0x22f0 [ 756.313560][ T7500] ? copy_strings_kernel+0x110/0x110 [ 756.318883][ T7500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.325157][ T7500] ? getname_flags+0x277/0x5b0 [ 756.329962][ T7500] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.336059][ T7500] __x64_sys_execve+0x8f/0xc0 [ 756.340792][ T7500] do_syscall_64+0x103/0x670 [ 756.345590][ T7500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.351501][ T7500] RIP: 0033:0x458da9 [ 756.355849][ T7500] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:31:21 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:21 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f0c0000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:21 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") fcntl$notify(r0, 0x402, 0x1) 16:31:21 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f04bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") [ 756.380367][ T7500] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 756.380382][ T7500] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 756.380390][ T7500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 756.380404][ T7500] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 756.380413][ T7500] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 756.380433][ T7500] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:21 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:21 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:21 executing program 0 (fault-call:5 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:21 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f120000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 756.650253][ T7807] FAULT_INJECTION: forcing a failure. [ 756.650253][ T7807] name fail_page_alloc, interval 1, probability 0, space 0, times 0 16:31:21 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:21 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x8000, 0x0) syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000140)="f3440f5a3ca0400f49eec4a1a9fc702ac4227d3028c4a1b1f2aac6000000c4619dc23bc544e0448f6878c2e18ac423fd69ec243ef045839f0d00000084") 16:31:21 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:21 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000600003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 756.842013][ T7807] CPU: 1 PID: 7807 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 756.851100][ T7807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.861177][ T7807] Call Trace: [ 756.864589][ T7807] dump_stack+0x172/0x1f0 [ 756.868954][ T7807] should_fail.cold+0xa/0x15 [ 756.873588][ T7807] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 756.879432][ T7807] ? ___might_sleep+0x163/0x280 [ 756.884326][ T7807] should_fail_alloc_page+0x50/0x60 [ 756.889551][ T7807] __alloc_pages_nodemask+0x1a1/0x8d0 [ 756.894959][ T7807] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 756.900810][ T7807] ? find_held_lock+0x35/0x130 [ 756.905602][ T7807] ? percpu_ref_put_many+0x94/0x190 [ 756.910819][ T7807] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 756.917093][ T7807] alloc_pages_current+0x107/0x210 [ 756.922237][ T7807] __get_free_pages+0xc/0x40 [ 756.926858][ T7807] pgd_alloc+0x8b/0x3f0 [ 756.931487][ T7807] ? pgd_page_get_mm+0x40/0x40 [ 756.936380][ T7807] ? lockdep_init_map+0x1be/0x6d0 [ 756.942024][ T7807] ? lockdep_init_map+0x1be/0x6d0 [ 756.947238][ T7807] mm_init+0x59d/0x9c0 [ 756.951360][ T7807] mm_alloc+0xa6/0xd0 [ 756.955536][ T7807] __do_execve_file.isra.0+0xa73/0x22f0 [ 756.961223][ T7807] ? copy_strings_kernel+0x110/0x110 [ 756.966629][ T7807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.972983][ T7807] ? getname_flags+0x277/0x5b0 [ 756.978272][ T7807] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.984395][ T7807] __x64_sys_execve+0x8f/0xc0 16:31:21 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000c00003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:21 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 756.989196][ T7807] do_syscall_64+0x103/0x670 [ 756.993854][ T7807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.999777][ T7807] RIP: 0033:0x458da9 [ 757.003697][ T7807] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.023331][ T7807] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 757.031777][ T7807] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 16:31:21 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 757.031786][ T7807] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 757.031793][ T7807] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 757.031801][ T7807] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 757.031809][ T7807] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:21 executing program 0 (fault-call:5 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:21 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:21 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000240)={0x1, 0x6, 0x0, 0x9, 0xffff, 0x9}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000140)={0x3, 0x9, 0x1, {0x6, @pix={0x8, 0x2, 0x38414761, 0x6, 0x2656, 0x4, 0x9, 0xfffffffffffffffd, 0x1, 0x6, 0x1, 0x4}}}) syz_execute_func(&(0x7f0000000000)="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") 16:31:21 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:21 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f001200003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:21 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f10bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:31:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 757.332298][ T7990] FAULT_INJECTION: forcing a failure. [ 757.332298][ T7990] name failslab, interval 1, probability 0, space 0, times 0 16:31:22 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:22 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:31:22 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") [ 757.448071][ T7990] CPU: 0 PID: 7990 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 757.457261][ T7990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.467794][ T7990] Call Trace: [ 757.471135][ T7990] dump_stack+0x172/0x1f0 [ 757.475518][ T7990] should_fail.cold+0xa/0x15 [ 757.480235][ T7990] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 757.486085][ T7990] ? ___might_sleep+0x163/0x280 [ 757.491057][ T7990] __should_failslab+0x121/0x190 16:31:22 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x2) [ 757.496038][ T7990] should_failslab+0x9/0x14 [ 757.500578][ T7990] kmem_cache_alloc+0x2b2/0x6f0 [ 757.505470][ T7990] vm_area_alloc+0x20/0x110 [ 757.510025][ T7990] __do_execve_file.isra.0+0xbf5/0x22f0 [ 757.515687][ T7990] ? copy_strings_kernel+0x110/0x110 [ 757.521114][ T7990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.527501][ T7990] ? getname_flags+0x277/0x5b0 [ 757.532463][ T7990] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.538642][ T7990] __x64_sys_execve+0x8f/0xc0 [ 757.543362][ T7990] do_syscall_64+0x103/0x670 [ 757.547985][ T7990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.553986][ T7990] RIP: 0033:0x458da9 [ 757.557908][ T7990] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.577878][ T7990] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 757.586324][ T7990] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 16:31:22 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x3) [ 757.594338][ T7990] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 757.602452][ T7990] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 757.610547][ T7990] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 757.618634][ T7990] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:22 executing program 0 (fault-call:5 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 757.770362][ T8165] FAULT_INJECTION: forcing a failure. [ 757.770362][ T8165] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 757.789688][ T8165] CPU: 0 PID: 8165 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 757.798777][ T8165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.808859][ T8165] Call Trace: [ 757.812162][ T8165] dump_stack+0x172/0x1f0 [ 757.816529][ T8165] should_fail.cold+0xa/0x15 [ 757.821144][ T8165] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 757.827042][ T8165] ? ___might_sleep+0x163/0x280 [ 757.831925][ T8165] should_fail_alloc_page+0x50/0x60 [ 757.837180][ T8165] __alloc_pages_nodemask+0x1a1/0x8d0 [ 757.842589][ T8165] ? timespec64_trunc+0x180/0x180 [ 757.847613][ T8165] ? mpage_end_io+0x6f0/0x6f0 [ 757.852287][ T8165] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 757.858041][ T8165] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 757.864294][ T8165] alloc_pages_current+0x107/0x210 [ 757.869442][ T8165] get_zeroed_page+0x14/0x50 [ 757.875305][ T8165] __pud_alloc+0x3b/0x250 [ 757.881507][ T8165] __handle_mm_fault+0x7a5/0x3ec0 [ 757.886558][ T8165] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 757.892130][ T8165] ? find_held_lock+0x35/0x130 [ 757.896889][ T8165] ? handle_mm_fault+0x292/0xa90 [ 757.901828][ T8165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.908067][ T8165] ? kasan_check_read+0x11/0x20 [ 757.912917][ T8165] handle_mm_fault+0x3b7/0xa90 [ 757.917696][ T8165] __get_user_pages+0x7b6/0x1a40 [ 757.922649][ T8165] ? follow_page_mask+0x19a0/0x19a0 [ 757.927843][ T8165] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 757.933560][ T8165] get_user_pages_remote+0x23f/0x480 [ 757.938849][ T8165] copy_strings.isra.0+0x3bd/0x870 [ 757.944000][ T8165] ? remove_arg_zero+0x580/0x580 [ 757.948934][ T8165] ? prepare_binprm+0x677/0x900 [ 757.953773][ T8165] ? install_exec_creds+0x170/0x170 [ 757.959012][ T8165] copy_strings_kernel+0xa5/0x110 [ 757.964038][ T8165] __do_execve_file.isra.0+0x107d/0x22f0 [ 757.969672][ T8165] ? copy_strings_kernel+0x110/0x110 [ 757.975054][ T8165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.981323][ T8165] ? getname_flags+0x277/0x5b0 [ 757.986092][ T8165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.992158][ T8165] __x64_sys_execve+0x8f/0xc0 [ 757.996943][ T8165] do_syscall_64+0x103/0x670 [ 758.001552][ T8165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.007658][ T8165] RIP: 0033:0x458da9 [ 758.011568][ T8165] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.031918][ T8165] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 758.043344][ T8165] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 758.051342][ T8165] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 758.059616][ T8165] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 758.067612][ T8165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 758.075611][ T8165] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:22 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000000)="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") write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000140)={0xa, 0x3, 0x9, 0x3ff}, 0xa) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x802, 0x0) 16:31:22 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f002000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:22 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x4) 16:31:22 executing program 0 (fault-call:5 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:22 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f6b2600003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 758.253879][ T8283] FAULT_INJECTION: forcing a failure. [ 758.253879][ T8283] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 758.301793][ T8283] CPU: 0 PID: 8283 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 758.310883][ T8283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.320966][ T8283] Call Trace: [ 758.324288][ T8283] dump_stack+0x172/0x1f0 [ 758.328661][ T8283] should_fail.cold+0xa/0x15 [ 758.333287][ T8283] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.339137][ T8283] ? ___might_sleep+0x163/0x280 [ 758.344019][ T8283] should_fail_alloc_page+0x50/0x60 [ 758.349239][ T8283] __alloc_pages_nodemask+0x1a1/0x8d0 [ 758.354638][ T8283] ? timespec64_trunc+0x180/0x180 [ 758.359687][ T8283] ? mpage_end_io+0x6f0/0x6f0 [ 758.364391][ T8283] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 758.370161][ T8283] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 758.376442][ T8283] alloc_pages_current+0x107/0x210 [ 758.381591][ T8283] get_zeroed_page+0x14/0x50 [ 758.386205][ T8283] __pud_alloc+0x3b/0x250 [ 758.390565][ T8283] __handle_mm_fault+0x7a5/0x3ec0 [ 758.395622][ T8283] ? vmf_insert_mixed_mkwrite+0x40/0x40 16:31:23 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x109400, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000180)=0x1c, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="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") [ 758.401401][ T8283] ? find_held_lock+0x35/0x130 [ 758.406192][ T8283] ? handle_mm_fault+0x292/0xa90 [ 758.411181][ T8283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.417480][ T8283] ? kasan_check_read+0x11/0x20 [ 758.422375][ T8283] handle_mm_fault+0x3b7/0xa90 [ 758.427179][ T8283] __get_user_pages+0x7b6/0x1a40 [ 758.427206][ T8283] ? follow_page_mask+0x19a0/0x19a0 [ 758.427237][ T8283] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 758.437521][ T8283] get_user_pages_remote+0x23f/0x480 [ 758.437548][ T8283] copy_strings.isra.0+0x3bd/0x870 [ 758.437569][ T8283] ? remove_arg_zero+0x580/0x580 [ 758.437583][ T8283] ? prepare_binprm+0x677/0x900 [ 758.437606][ T8283] ? install_exec_creds+0x170/0x170 [ 758.468724][ T8283] copy_strings_kernel+0xa5/0x110 [ 758.473776][ T8283] __do_execve_file.isra.0+0x107d/0x22f0 [ 758.479442][ T8283] ? copy_strings_kernel+0x110/0x110 [ 758.484782][ T8283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.491047][ T8283] ? getname_flags+0x277/0x5b0 [ 758.495836][ T8283] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.501951][ T8283] __x64_sys_execve+0x8f/0xc0 [ 758.506654][ T8283] do_syscall_64+0x103/0x670 [ 758.511275][ T8283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.517197][ T8283] RIP: 0033:0x458da9 [ 758.521146][ T8283] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.540773][ T8283] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 16:31:23 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:23 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f003f00003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:23 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xa) [ 758.549209][ T8283] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 758.557378][ T8283] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 758.557387][ T8283] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 758.557401][ T8283] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 758.557409][ T8283] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:23 executing program 0 (fault-call:5 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:23 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f004000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:23 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xe) [ 758.710075][ T8513] FAULT_INJECTION: forcing a failure. [ 758.710075][ T8513] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 758.755732][ T8513] CPU: 0 PID: 8513 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 758.764847][ T8513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.775020][ T8513] Call Trace: [ 758.778369][ T8513] dump_stack+0x172/0x1f0 [ 758.782756][ T8513] should_fail.cold+0xa/0x15 [ 758.787472][ T8513] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.793352][ T8513] ? ___might_sleep+0x163/0x280 [ 758.798251][ T8513] should_fail_alloc_page+0x50/0x60 [ 758.803482][ T8513] __alloc_pages_nodemask+0x1a1/0x8d0 [ 758.808885][ T8513] ? __pud_alloc+0x1d3/0x250 [ 758.808907][ T8513] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 758.808922][ T8513] ? __pud_alloc+0x1d3/0x250 [ 758.808947][ T8513] ? lock_downgrade+0x880/0x880 [ 758.808964][ T8513] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 758.808984][ T8513] alloc_pages_current+0x107/0x210 [ 758.809008][ T8513] __pmd_alloc+0x41/0x460 [ 758.819355][ T8513] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 758.819379][ T8513] __handle_mm_fault+0x192a/0x3ec0 [ 758.819410][ T8513] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 758.819426][ T8513] ? find_held_lock+0x35/0x130 [ 758.819443][ T8513] ? handle_mm_fault+0x292/0xa90 [ 758.819501][ T8513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.819525][ T8513] ? kasan_check_read+0x11/0x20 [ 758.882953][ T8513] handle_mm_fault+0x3b7/0xa90 [ 758.887758][ T8513] __get_user_pages+0x7b6/0x1a40 [ 758.892738][ T8513] ? follow_page_mask+0x19a0/0x19a0 [ 758.897964][ T8513] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 758.903718][ T8513] get_user_pages_remote+0x23f/0x480 [ 758.909057][ T8513] copy_strings.isra.0+0x3bd/0x870 [ 758.914210][ T8513] ? remove_arg_zero+0x580/0x580 [ 758.919351][ T8513] ? prepare_binprm+0x677/0x900 [ 758.924234][ T8513] ? install_exec_creds+0x170/0x170 [ 758.929489][ T8513] copy_strings_kernel+0xa5/0x110 [ 758.934557][ T8513] __do_execve_file.isra.0+0x107d/0x22f0 [ 758.940332][ T8513] ? copy_strings_kernel+0x110/0x110 [ 758.945657][ T8513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.952030][ T8513] ? getname_flags+0x277/0x5b0 [ 758.956831][ T8513] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.963121][ T8513] __x64_sys_execve+0x8f/0xc0 [ 758.967849][ T8513] do_syscall_64+0x103/0x670 [ 758.972478][ T8513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.978413][ T8513] RIP: 0033:0x458da9 [ 758.985748][ T8513] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:31:23 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f266b00003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:23 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf) [ 759.005368][ T8513] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 759.013821][ T8513] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 759.021813][ T8513] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 759.029800][ T8513] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 759.037789][ T8513] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 759.045866][ T8513] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:23 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x60) 16:31:23 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f0fff00003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:23 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x9f26, 0xa000) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000180)=0x1, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:24 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf0) 16:31:24 executing program 0 (fault-call:5 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:24 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000020003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:24 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 759.473636][ T8854] FAULT_INJECTION: forcing a failure. [ 759.473636][ T8854] name failslab, interval 1, probability 0, space 0, times 0 [ 759.502626][ T8854] CPU: 1 PID: 8854 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 16:31:24 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x300) [ 759.514238][ T8854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.524330][ T8854] Call Trace: [ 759.527650][ T8854] dump_stack+0x172/0x1f0 [ 759.532014][ T8854] should_fail.cold+0xa/0x15 [ 759.536640][ T8854] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 759.536664][ T8854] ? ___might_sleep+0x163/0x280 [ 759.536691][ T8854] __should_failslab+0x121/0x190 [ 759.547401][ T8854] should_failslab+0x9/0x14 [ 759.547417][ T8854] kmem_cache_alloc+0x2b2/0x6f0 [ 759.547436][ T8854] ? alloc_pages_current+0x10f/0x210 [ 759.547453][ T8854] __pmd_alloc+0xc9/0x460 [ 759.547469][ T8854] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.547486][ T8854] __handle_mm_fault+0x192a/0x3ec0 [ 759.547507][ T8854] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 759.547523][ T8854] ? find_held_lock+0x35/0x130 [ 759.547540][ T8854] ? handle_mm_fault+0x292/0xa90 [ 759.547563][ T8854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.547579][ T8854] ? kasan_check_read+0x11/0x20 [ 759.547596][ T8854] handle_mm_fault+0x3b7/0xa90 [ 759.547614][ T8854] __get_user_pages+0x7b6/0x1a40 [ 759.547640][ T8854] ? follow_page_mask+0x19a0/0x19a0 [ 759.547659][ T8854] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 759.547684][ T8854] get_user_pages_remote+0x23f/0x480 [ 759.635609][ T8854] copy_strings.isra.0+0x3bd/0x870 [ 759.640762][ T8854] ? remove_arg_zero+0x580/0x580 [ 759.645717][ T8854] ? prepare_binprm+0x677/0x900 [ 759.650593][ T8854] ? install_exec_creds+0x170/0x170 [ 759.655812][ T8854] copy_strings_kernel+0xa5/0x110 [ 759.660861][ T8854] __do_execve_file.isra.0+0x107d/0x22f0 [ 759.666521][ T8854] ? copy_strings_kernel+0x110/0x110 [ 759.671833][ T8854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.679520][ T8854] ? getname_flags+0x277/0x5b0 [ 759.684304][ T8854] __x64_sys_execve+0x8f/0xc0 [ 759.689013][ T8854] do_syscall_64+0x103/0x670 [ 759.693628][ T8854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.699557][ T8854] RIP: 0033:0x458da9 [ 759.703765][ T8854] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:31:24 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000013ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 759.723762][ T8854] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 759.732207][ T8854] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 759.740324][ T8854] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 759.748347][ T8854] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 759.756433][ T8854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 759.764518][ T8854] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:24 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x9b7) 16:31:24 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000023ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:24 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xa00) 16:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:24 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) clock_settime(0x7, &(0x7f0000000000)={0x0, 0x1c9c380}) syz_execute_func(&(0x7f00000002c0)="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") ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000140)={0x5, 0x2}) 16:31:24 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xe00) 16:31:24 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000043ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:24 executing program 0 (fault-call:5 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 760.354406][ T9004] FAULT_INJECTION: forcing a failure. [ 760.354406][ T9004] name failslab, interval 1, probability 0, space 0, times 0 [ 760.380959][ T9004] CPU: 0 PID: 9004 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 760.390050][ T9004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.400139][ T9004] Call Trace: [ 760.403591][ T9004] dump_stack+0x172/0x1f0 [ 760.407959][ T9004] should_fail.cold+0xa/0x15 [ 760.412619][ T9004] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 760.418478][ T9004] ? ___might_sleep+0x163/0x280 [ 760.423373][ T9004] __should_failslab+0x121/0x190 [ 760.428358][ T9004] should_failslab+0x9/0x14 [ 760.432926][ T9004] kmem_cache_alloc+0x2b2/0x6f0 [ 760.437810][ T9004] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 760.444101][ T9004] ptlock_alloc+0x20/0x70 [ 760.448585][ T9004] pte_alloc_one+0x6d/0x1a0 [ 760.453124][ T9004] __pte_alloc+0x20/0x310 [ 760.453146][ T9004] __handle_mm_fault+0x3391/0x3ec0 [ 760.453172][ T9004] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 760.462895][ T9004] ? find_held_lock+0x35/0x130 [ 760.462918][ T9004] ? handle_mm_fault+0x292/0xa90 [ 760.462955][ T9004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.484829][ T9004] ? kasan_check_read+0x11/0x20 [ 760.489717][ T9004] handle_mm_fault+0x3b7/0xa90 [ 760.494605][ T9004] __get_user_pages+0x7b6/0x1a40 [ 760.499581][ T9004] ? follow_page_mask+0x19a0/0x19a0 [ 760.514018][ T9004] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 760.519879][ T9004] get_user_pages_remote+0x23f/0x480 [ 760.525212][ T9004] copy_strings.isra.0+0x3bd/0x870 [ 760.530362][ T9004] ? remove_arg_zero+0x580/0x580 [ 760.535478][ T9004] ? prepare_binprm+0x677/0x900 [ 760.540360][ T9004] ? install_exec_creds+0x170/0x170 [ 760.545593][ T9004] copy_strings_kernel+0xa5/0x110 [ 760.545614][ T9004] __do_execve_file.isra.0+0x107d/0x22f0 [ 760.545638][ T9004] ? copy_strings_kernel+0x110/0x110 [ 760.545665][ T9004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.556341][ T9004] ? getname_flags+0x277/0x5b0 [ 760.556361][ T9004] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.556378][ T9004] __x64_sys_execve+0x8f/0xc0 [ 760.556407][ T9004] do_syscall_64+0x103/0x670 [ 760.556433][ T9004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.594334][ T9004] RIP: 0033:0x458da9 [ 760.598341][ T9004] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 760.617968][ T9004] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 760.626423][ T9004] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 760.634518][ T9004] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 760.642502][ T9004] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 760.650485][ T9004] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 16:31:25 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:25 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf00) 16:31:25 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000063ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:25 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="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") 16:31:25 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f0000000c3ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 760.658648][ T9004] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:25 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x3f00) 16:31:25 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x10) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000180)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xf4, 0x2, {"7c27d9af079831cb931fead8c75f94a7798500cc1444b989d9ff85bd1a30dc7ebee0c09b99f549b3421cf428f9dbb5ebb5a42a6bbea71558612bbec7e558f5b011e21b8056ea5598fd487c507ccc4b4600c37689cf6ffbeaa8ef3f57a84b46f75fa5489af3560f0af893e0dc5717ede6412937b61401ac7c543429046b64d8b2aa87605a6219c791503639396c0267886bad752a6210d55d25a9acc67d8aa382fdb6e09e90f2e9461e8d4050a28cbc0fa875ac3e0bb7a026517533fe6e1554a585912289729e0c4db3764489d36d97a50b7de163cc8da6bdfb57"}}, {0x0, "5e7c0677f61cb4e4748bd64ea2eaaefa2d3b8d9ff3c336a4a2732461261c423ca5f0a6227c56fbb751d6499bd03dd8eac01562be7ce007b7adf5b06162bdeccef554b1a558f30317359b555aecc931a75355cd"}}, &(0x7f0000000400)=""/160, 0x149, 0xa0}, 0x20) syz_execute_func(&(0x7f0000000000)="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") 16:31:25 executing program 0 (fault-call:5 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:25 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000123ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:25 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x4000) [ 760.910205][ T9440] FAULT_INJECTION: forcing a failure. [ 760.910205][ T9440] name failslab, interval 1, probability 0, space 0, times 0 [ 760.946568][ T9440] CPU: 1 PID: 9440 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 760.955671][ T9440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.965844][ T9440] Call Trace: [ 760.969448][ T9440] dump_stack+0x172/0x1f0 [ 760.973836][ T9440] should_fail.cold+0xa/0x15 [ 760.978478][ T9440] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 760.984424][ T9440] ? ___might_sleep+0x163/0x280 [ 760.989302][ T9440] __should_failslab+0x121/0x190 [ 760.994380][ T9440] should_failslab+0x9/0x14 [ 760.998913][ T9440] kmem_cache_alloc+0x2b2/0x6f0 [ 761.003786][ T9440] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 761.010071][ T9440] ptlock_alloc+0x20/0x70 [ 761.014428][ T9440] pte_alloc_one+0x6d/0x1a0 [ 761.018951][ T9440] __pte_alloc+0x20/0x310 [ 761.023280][ T9440] __handle_mm_fault+0x3391/0x3ec0 [ 761.028404][ T9440] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 761.033975][ T9440] ? find_held_lock+0x35/0x130 [ 761.038793][ T9440] ? handle_mm_fault+0x292/0xa90 [ 761.043746][ T9440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.049994][ T9440] ? kasan_check_read+0x11/0x20 [ 761.054861][ T9440] handle_mm_fault+0x3b7/0xa90 [ 761.059655][ T9440] __get_user_pages+0x7b6/0x1a40 [ 761.064641][ T9440] ? follow_page_mask+0x19a0/0x19a0 [ 761.069853][ T9440] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 761.075601][ T9440] get_user_pages_remote+0x23f/0x480 [ 761.081009][ T9440] copy_strings.isra.0+0x3bd/0x870 [ 761.086136][ T9440] ? remove_arg_zero+0x580/0x580 [ 761.091085][ T9440] ? prepare_binprm+0x677/0x900 [ 761.095947][ T9440] ? install_exec_creds+0x170/0x170 [ 761.101160][ T9440] copy_strings_kernel+0xa5/0x110 [ 761.106214][ T9440] __do_execve_file.isra.0+0x107d/0x22f0 [ 761.111879][ T9440] ? copy_strings_kernel+0x110/0x110 [ 761.117286][ T9440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.123570][ T9440] ? getname_flags+0x277/0x5b0 [ 761.128448][ T9440] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.134552][ T9440] __x64_sys_execve+0x8f/0xc0 [ 761.139239][ T9440] do_syscall_64+0x103/0x670 [ 761.143838][ T9440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.149736][ T9440] RIP: 0033:0x458da9 [ 761.153642][ T9440] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 761.173429][ T9440] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 761.181882][ T9440] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 761.189876][ T9440] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 761.198021][ T9440] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 761.206203][ T9440] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 761.214218][ T9440] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:26 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f0000003f3ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(0x0, 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:26 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x6000) 16:31:26 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:26 executing program 0 (fault-call:5 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 761.582479][ T9562] FAULT_INJECTION: forcing a failure. [ 761.582479][ T9562] name failslab, interval 1, probability 0, space 0, times 0 16:31:26 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xb709) [ 761.668421][ T9562] CPU: 0 PID: 9562 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 761.677516][ T9562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.687766][ T9562] Call Trace: [ 761.691086][ T9562] dump_stack+0x172/0x1f0 [ 761.695461][ T9562] should_fail.cold+0xa/0x15 [ 761.700092][ T9562] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 761.705934][ T9562] ? ___might_sleep+0x163/0x280 [ 761.710909][ T9562] __should_failslab+0x121/0x190 [ 761.715879][ T9562] should_failslab+0x9/0x14 [ 761.720403][ T9562] kmem_cache_alloc+0x2b2/0x6f0 [ 761.725285][ T9562] ? __might_sleep+0x95/0x190 [ 761.729991][ T9562] __anon_vma_prepare+0x62/0x3c0 [ 761.734947][ T9562] ? __pte_alloc+0x1ba/0x310 [ 761.739557][ T9562] __handle_mm_fault+0x34db/0x3ec0 [ 761.744694][ T9562] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 761.750254][ T9562] ? find_held_lock+0x35/0x130 [ 761.755033][ T9562] ? handle_mm_fault+0x292/0xa90 [ 761.755069][ T9562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.766260][ T9562] ? kasan_check_read+0x11/0x20 [ 761.766283][ T9562] handle_mm_fault+0x3b7/0xa90 [ 761.766304][ T9562] __get_user_pages+0x7b6/0x1a40 [ 761.766330][ T9562] ? follow_page_mask+0x19a0/0x19a0 [ 761.766357][ T9562] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 761.791845][ T9562] get_user_pages_remote+0x23f/0x480 [ 761.797171][ T9562] copy_strings.isra.0+0x3bd/0x870 [ 761.802411][ T9562] ? remove_arg_zero+0x580/0x580 [ 761.807370][ T9562] ? prepare_binprm+0x677/0x900 [ 761.812257][ T9562] ? install_exec_creds+0x170/0x170 [ 761.817583][ T9562] copy_strings_kernel+0xa5/0x110 [ 761.822645][ T9562] __do_execve_file.isra.0+0x107d/0x22f0 [ 761.831533][ T9562] ? copy_strings_kernel+0x110/0x110 [ 761.836857][ T9562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.843164][ T9562] ? getname_flags+0x277/0x5b0 [ 761.847960][ T9562] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.854071][ T9562] __x64_sys_execve+0x8f/0xc0 [ 761.858786][ T9562] do_syscall_64+0x103/0x670 [ 761.863419][ T9562] entry_SYSCALL_64_after_hwframe+0x49/0xbe 16:31:26 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) fcntl$addseals(r0, 0x409, 0x8) 16:31:26 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000403ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:26 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569fa0b9db443ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:26 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x2) syz_execute_func(&(0x7f0000000000)="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") [ 761.869333][ T9562] RIP: 0033:0x458da9 [ 761.873245][ T9562] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 761.892992][ T9562] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 761.901435][ T9562] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 761.909424][ T9562] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 16:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 761.909433][ T9562] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 761.909441][ T9562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 761.909449][ T9562] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:26 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf000) 16:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:26 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569fe93a8d4a3ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:27 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf08000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:31:27 executing program 0 (fault-call:5 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:27 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x34000) 16:31:27 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f0000266b3ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 762.513054][ T9913] FAULT_INJECTION: forcing a failure. [ 762.513054][ T9913] name failslab, interval 1, probability 0, space 0, times 0 [ 762.542284][ T9913] CPU: 0 PID: 9913 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 762.551368][ T9913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.561451][ T9913] Call Trace: [ 762.564786][ T9913] dump_stack+0x172/0x1f0 [ 762.569156][ T9913] should_fail.cold+0xa/0x15 [ 762.569178][ T9913] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.569203][ T9913] ? ___might_sleep+0x163/0x280 [ 762.569231][ T9913] __should_failslab+0x121/0x190 [ 762.585159][ T9913] should_failslab+0x9/0x14 [ 762.585177][ T9913] kmem_cache_alloc+0x2b2/0x6f0 [ 762.585199][ T9913] ? __might_sleep+0x95/0x190 [ 762.585226][ T9913] __anon_vma_prepare+0x1b1/0x3c0 [ 762.609279][ T9913] ? __pte_alloc+0x1ba/0x310 [ 762.613919][ T9913] __handle_mm_fault+0x34db/0x3ec0 [ 762.624515][ T9913] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 762.630308][ T9913] ? find_held_lock+0x35/0x130 [ 762.635120][ T9913] ? handle_mm_fault+0x292/0xa90 [ 762.640094][ T9913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.640115][ T9913] ? kasan_check_read+0x11/0x20 [ 762.640137][ T9913] handle_mm_fault+0x3b7/0xa90 [ 762.640161][ T9913] __get_user_pages+0x7b6/0x1a40 16:31:27 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x400300) 16:31:27 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f44dbb9a03ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 762.661187][ T9913] ? follow_page_mask+0x19a0/0x19a0 [ 762.666446][ T9913] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 762.672221][ T9913] get_user_pages_remote+0x23f/0x480 [ 762.678001][ T9913] copy_strings.isra.0+0x3bd/0x870 [ 762.683170][ T9913] ? remove_arg_zero+0x580/0x580 [ 762.688122][ T9913] ? prepare_binprm+0x677/0x900 [ 762.692995][ T9913] ? install_exec_creds+0x170/0x170 [ 762.698237][ T9913] copy_strings_kernel+0xa5/0x110 [ 762.703387][ T9913] __do_execve_file.isra.0+0x107d/0x22f0 [ 762.709077][ T9913] ? copy_strings_kernel+0x110/0x110 [ 762.714413][ T9913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.720841][ T9913] ? getname_flags+0x277/0x5b0 [ 762.725749][ T9913] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.731859][ T9913] __x64_sys_execve+0x8f/0xc0 [ 762.736655][ T9913] do_syscall_64+0x103/0x670 [ 762.741373][ T9913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.747298][ T9913] RIP: 0033:0x458da9 [ 762.751233][ T9913] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.771032][ T9913] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 762.779490][ T9913] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 762.789052][ T9913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 762.797219][ T9913] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 762.806859][ T9913] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 762.814851][ T9913] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:27 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4000000000, 0x0) syz_execute_func(&(0x7f0000000000)="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") fcntl$setpipe(r0, 0x407, 0x6) 16:31:27 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf0ffff) 16:31:27 executing program 0 (fault-call:5 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:27 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f4a8d3ae93ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 763.035847][T10135] FAULT_INJECTION: forcing a failure. [ 763.035847][T10135] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 763.079086][T10135] CPU: 0 PID: 10135 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 763.088343][T10135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.098523][T10135] Call Trace: [ 763.098553][T10135] dump_stack+0x172/0x1f0 [ 763.098579][T10135] should_fail.cold+0xa/0x15 [ 763.098606][T10135] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.116658][T10135] ? ___might_sleep+0x163/0x280 [ 763.116690][T10135] should_fail_alloc_page+0x50/0x60 [ 763.116704][T10135] __alloc_pages_nodemask+0x1a1/0x8d0 [ 763.116723][T10135] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 763.116740][T10135] ? lock_downgrade+0x880/0x880 [ 763.116764][T10135] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 763.116788][T10135] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 763.155238][T10135] alloc_pages_vma+0xdd/0x540 [ 763.159939][T10135] __handle_mm_fault+0x1dd4/0x3ec0 [ 763.165073][T10135] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 763.170646][T10135] ? find_held_lock+0x35/0x130 [ 763.175438][T10135] ? handle_mm_fault+0x292/0xa90 [ 763.180417][T10135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.186687][T10135] ? kasan_check_read+0x11/0x20 [ 763.191657][T10135] handle_mm_fault+0x3b7/0xa90 [ 763.196460][T10135] __get_user_pages+0x7b6/0x1a40 [ 763.201466][T10135] ? follow_page_mask+0x19a0/0x19a0 [ 763.206702][T10135] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 763.212666][T10135] get_user_pages_remote+0x23f/0x480 [ 763.217998][T10135] copy_strings.isra.0+0x3bd/0x870 [ 763.223227][T10135] ? remove_arg_zero+0x580/0x580 [ 763.228182][T10135] ? prepare_binprm+0x677/0x900 [ 763.233074][T10135] ? install_exec_creds+0x170/0x170 [ 763.238320][T10135] copy_strings_kernel+0xa5/0x110 [ 763.245287][T10135] __do_execve_file.isra.0+0x107d/0x22f0 [ 763.251147][T10135] ? copy_strings_kernel+0x110/0x110 [ 763.256465][T10135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.262918][T10135] ? getname_flags+0x277/0x5b0 [ 763.262940][T10135] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.262961][T10135] __x64_sys_execve+0x8f/0xc0 [ 763.262984][T10135] do_syscall_64+0x103/0x670 [ 763.263008][T10135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.273927][T10135] RIP: 0033:0x458da9 [ 763.273947][T10135] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.273955][T10135] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 763.273971][T10135] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 763.273980][T10135] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 763.273988][T10135] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 763.274006][T10135] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 763.322460][T10135] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:28 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:28 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x1000000) 16:31:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:28 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000180)=""/66) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x2) bind$isdn_base(r1, &(0x7f0000000300)={0x22, 0x10001, 0x3, 0x1, 0x9}, 0x6) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000002c0)=0x7) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000280)={0xf535, "5761ecda9451e8e43185af16e66e66023f1640fd82f39d016655fc1f6b0ca7d9", 0x1, 0x1}) fcntl$setsig(r0, 0xa, 0x26) 16:31:28 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569ffffffffe3ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:28 executing program 0 (fault-call:5 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:28 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x2000000) [ 763.517746][T10460] FAULT_INJECTION: forcing a failure. [ 763.517746][T10460] name failslab, interval 1, probability 0, space 0, times 0 16:31:28 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f00000fff3ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 763.590195][T10460] CPU: 0 PID: 10460 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 763.601913][T10460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.612266][T10460] Call Trace: [ 763.615676][T10460] dump_stack+0x172/0x1f0 [ 763.620063][T10460] should_fail.cold+0xa/0x15 [ 763.624686][T10460] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.630533][T10460] ? ___might_sleep+0x163/0x280 [ 763.635411][T10460] __should_failslab+0x121/0x190 [ 763.635449][T10460] should_failslab+0x9/0x14 [ 763.635464][T10460] kmem_cache_alloc_trace+0x2d1/0x760 [ 763.635485][T10460] ? mark_held_locks+0xf0/0xf0 [ 763.635509][T10460] tomoyo_find_next_domain+0x126/0x1f6c [ 763.635536][T10460] ? tomoyo_dump_page+0x500/0x500 [ 763.645239][T10460] ? lock_acquire+0x16f/0x3f0 [ 763.645258][T10460] ? tomoyo_bprm_check_security+0xdd/0x1b0 [ 763.645286][T10460] tomoyo_bprm_check_security+0x124/0x1b0 [ 763.682230][T10460] ? tomoyo_bprm_check_security+0xdd/0x1b0 16:31:28 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x3000000) [ 763.688078][T10460] security_bprm_check+0x69/0xb0 [ 763.693044][T10460] search_binary_handler+0x71/0x580 [ 763.698268][T10460] ? kasan_check_read+0x11/0x20 [ 763.703172][T10460] __do_execve_file.isra.0+0x1310/0x22f0 [ 763.708845][T10460] ? copy_strings_kernel+0x110/0x110 [ 763.714156][T10460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.720426][T10460] ? getname_flags+0x277/0x5b0 [ 763.725216][T10460] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.731314][T10460] __x64_sys_execve+0x8f/0xc0 [ 763.736041][T10460] do_syscall_64+0x103/0x670 [ 763.740656][T10460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.746571][T10460] RIP: 0033:0x458da9 [ 763.750577][T10460] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.773678][T10460] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 763.782126][T10460] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 16:31:28 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f7fffffff3ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 763.790214][T10460] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 763.798219][T10460] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 763.807691][T10460] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 763.815688][T10460] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:28 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0xffffffffffffff8b, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x100000000000) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x2001, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) syz_execute_func(&(0x7f0000000000)="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") 16:31:28 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x4000000) 16:31:29 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 16:31:29 executing program 0 (fault-call:5 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:29 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xa000000) 16:31:29 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569ffeffffff3ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:29 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xe000000) 16:31:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) [ 764.440040][T10803] FAULT_INJECTION: forcing a failure. [ 764.440040][T10803] name failslab, interval 1, probability 0, space 0, times 0 [ 764.495770][T10803] CPU: 0 PID: 10803 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 764.504950][T10803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.515029][T10803] Call Trace: [ 764.518359][T10803] dump_stack+0x172/0x1f0 [ 764.523104][T10803] should_fail.cold+0xa/0x15 [ 764.527730][T10803] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 764.533649][T10803] ? ___might_sleep+0x163/0x280 [ 764.538538][T10803] __should_failslab+0x121/0x190 16:31:29 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000200003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:29 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0xf000000) [ 764.543525][T10803] should_failslab+0x9/0x14 [ 764.548042][T10803] kmem_cache_alloc_trace+0x2d1/0x760 [ 764.553440][T10803] ? mark_held_locks+0xf0/0xf0 [ 764.558468][T10803] tomoyo_find_next_domain+0x126/0x1f6c [ 764.564147][T10803] ? tomoyo_dump_page+0x500/0x500 [ 764.574235][T10803] ? lock_acquire+0x16f/0x3f0 [ 764.574254][T10803] ? tomoyo_bprm_check_security+0xdd/0x1b0 [ 764.574278][T10803] tomoyo_bprm_check_security+0x124/0x1b0 [ 764.590722][T10803] ? tomoyo_bprm_check_security+0xdd/0x1b0 [ 764.590746][T10803] security_bprm_check+0x69/0xb0 [ 764.590767][T10803] search_binary_handler+0x71/0x580 [ 764.590783][T10803] ? kasan_check_read+0x11/0x20 [ 764.590806][T10803] __do_execve_file.isra.0+0x1310/0x22f0 [ 764.617321][T10803] ? copy_strings_kernel+0x110/0x110 [ 764.622641][T10803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.628918][T10803] ? getname_flags+0x277/0x5b0 [ 764.633716][T10803] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.639906][T10803] __x64_sys_execve+0x8f/0xc0 16:31:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) [ 764.644624][T10803] do_syscall_64+0x103/0x670 [ 764.649246][T10803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.661452][T10803] RIP: 0033:0x458da9 [ 764.665372][T10803] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.685172][T10803] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 764.693701][T10803] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 764.693710][T10803] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 764.693718][T10803] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 764.693727][T10803] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 764.693736][T10803] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 16:31:29 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)=0x4) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 16:31:29 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x3f000000) 16:31:29 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000400003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") 16:31:29 executing program 0 (fault-call:5 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setreuid(0x0, 0x0) mknod(&(0x7f0000000140)='./bus\x00', 0xa8a, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 16:31:29 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x10) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000180)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xf4, 0x2, {"7c27d9af079831cb931fead8c75f94a7798500cc1444b989d9ff85bd1a30dc7ebee0c09b99f549b3421cf428f9dbb5ebb5a42a6bbea71558612bbec7e558f5b011e21b8056ea5598fd487c507ccc4b4600c37689cf6ffbeaa8ef3f57a84b46f75fa5489af3560f0af893e0dc5717ede6412937b61401ac7c543429046b64d8b2aa87605a6219c791503639396c0267886bad752a6210d55d25a9acc67d8aa382fdb6e09e90f2e9461e8d4050a28cbc0fa875ac3e0bb7a026517533fe6e1554a585912289729e0c4db3764489d36d97a50b7de163cc8da6bdfb57"}}, {0x0, "5e7c0677f61cb4e4748bd64ea2eaaefa2d3b8d9ff3c336a4a2732461261c423ca5f0a6227c56fbb751d6499bd03dd8eac01562be7ce007b7adf5b06162bdeccef554b1a558f30317359b555aecc931a75355cd"}}, &(0x7f0000000400)=""/160, 0x149, 0xa0}, 0x20) syz_execute_func(&(0x7f0000000000)="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") 16:31:29 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 16:31:29 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x40000000) [ 765.333652][T11044] FAULT_INJECTION: forcing a failure. [ 765.333652][T11044] name failslab, interval 1, probability 0, space 0, times 0 16:31:30 executing program 4: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000000b07041dfffd9467a2830020200a0009000100001d85680c1baba20400ff7f", 0x24}], 0x1}, 0x60000000) [ 765.376453][T11044] CPU: 0 PID: 11044 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 765.385704][T11044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.395775][T11044] Call Trace: [ 765.395808][T11044] dump_stack+0x172/0x1f0 [ 765.395833][T11044] should_fail.cold+0xa/0x15 [ 765.395860][T11044] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.413881][T11044] ? ___might_sleep+0x163/0x280 [ 765.418747][T11044] __should_failslab+0x121/0x190 16:31:30 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000600003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 765.423891][T11044] should_failslab+0x9/0x14 [ 765.429900][T11044] __kmalloc+0x2dc/0x740 [ 765.434209][T11044] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 765.439957][T11044] ? rcu_read_lock_sched_held+0x110/0x130 [ 765.445713][T11044] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 765.451479][T11044] tomoyo_realpath_from_path+0xcd/0x7a0 [ 765.457062][T11044] tomoyo_realpath_nofollow+0xc8/0xdb [ 765.457080][T11044] ? tomoyo_realpath_from_path+0x7a0/0x7a0 [ 765.457105][T11044] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 765.474649][T11044] ? tomoyo_init_request_info+0x105/0x1d0 [ 765.474674][T11044] tomoyo_find_next_domain+0x280/0x1f6c [ 765.474704][T11044] ? tomoyo_dump_page+0x500/0x500 [ 765.474732][T11044] ? lock_acquire+0x16f/0x3f0 [ 765.495873][T11044] ? tomoyo_bprm_check_security+0xdd/0x1b0 [ 765.501732][T11044] tomoyo_bprm_check_security+0x124/0x1b0 [ 765.507828][T11044] ? tomoyo_bprm_check_security+0xdd/0x1b0 [ 765.513667][T11044] security_bprm_check+0x69/0xb0 [ 765.518637][T11044] search_binary_handler+0x71/0x580 16:31:30 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000c00003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 765.523856][T11044] ? kasan_check_read+0x11/0x20 [ 765.528757][T11044] __do_execve_file.isra.0+0x1310/0x22f0 [ 765.534432][T11044] ? copy_strings_kernel+0x110/0x110 [ 765.539749][T11044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.546099][T11044] ? getname_flags+0x277/0x5b0 [ 765.550880][T11044] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.550903][T11044] __x64_sys_execve+0x8f/0xc0 [ 765.550926][T11044] do_syscall_64+0x103/0x670 [ 765.550947][T11044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.550967][T11044] RIP: 0033:0x458da9 [ 765.566300][T11044] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 765.566310][T11044] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 765.566324][T11044] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 765.566333][T11044] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 16:31:30 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x6, 0x0) socket$inet6(0xa, 0x80003, 0xfc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="b18d91cd801b69696c69dc02d9d9d0c44139fd5bf9c7c7e4c653fb6d58c4a1e96be7c44149f2168f4808eebce00000802000c423fa3a51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f001200003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4e4837d1118fbc40213f5930a0000060013a485851369879f000000fe") [ 765.566342][T11044] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 765.566351][T11044] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 765.566360][T11044] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 [ 765.570878][T11044] ERROR: Out of memory at tomoyo_realpath_from_path. [ 765.653374][T11044] Kernel panic - not syncing: MAC Initialization failed. [ 765.658415][ T3877] kobject: 'loop2' (00000000b967be91): kobject_uevent_env [ 765.660449][T11044] CPU: 0 PID: 11044 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190501 #34 [ 765.672494][ T3877] kobject: 'loop2' (00000000b967be91): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 765.676648][T11044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.676655][T11044] Call Trace: [ 765.676680][T11044] dump_stack+0x172/0x1f0 [ 765.676705][T11044] panic+0x2cb/0x75a [ 765.676722][T11044] ? __warn_printk+0xf3/0xf3 [ 765.676746][T11044] ? tomoyo_realpath_from_path+0x3fa/0x7a0 [ 765.676759][T11044] ? tomoyo_warn_oom.cold+0x24/0x43 [ 765.676782][T11044] tomoyo_warn_oom.cold+0x35/0x43 [ 765.733601][T11044] tomoyo_realpath_from_path+0x40e/0x7a0 [ 765.739373][T11044] tomoyo_realpath_nofollow+0xc8/0xdb [ 765.744781][T11044] ? tomoyo_realpath_from_path+0x7a0/0x7a0 [ 765.750721][T11044] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 765.756984][T11044] ? tomoyo_init_request_info+0x105/0x1d0 [ 765.762730][T11044] tomoyo_find_next_domain+0x280/0x1f6c [ 765.766098][ T3877] kobject: 'loop2' (00000000b967be91): kobject_uevent_env [ 765.768308][T11044] ? tomoyo_dump_page+0x500/0x500 [ 765.780594][T11044] ? lock_acquire+0x16f/0x3f0 [ 765.784185][ T3877] kobject: 'loop2' (00000000b967be91): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 765.785393][T11044] ? tomoyo_bprm_check_security+0xdd/0x1b0 [ 765.785427][T11044] tomoyo_bprm_check_security+0x124/0x1b0 [ 765.785440][T11044] ? tomoyo_bprm_check_security+0xdd/0x1b0 [ 765.785461][T11044] security_bprm_check+0x69/0xb0 [ 765.785479][T11044] search_binary_handler+0x71/0x580 [ 765.785492][T11044] ? kasan_check_read+0x11/0x20 [ 765.785509][T11044] __do_execve_file.isra.0+0x1310/0x22f0 [ 765.785529][T11044] ? copy_strings_kernel+0x110/0x110 [ 765.785547][T11044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.785562][T11044] ? getname_flags+0x277/0x5b0 [ 765.785581][T11044] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.785597][T11044] __x64_sys_execve+0x8f/0xc0 [ 765.785616][T11044] do_syscall_64+0x103/0x670 [ 765.785642][T11044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.810998][ T3877] kobject: 'loop4' (00000000cbdf0bd8): kobject_uevent_env [ 765.815276][T11044] RIP: 0033:0x458da9 [ 765.815294][T11044] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 765.815303][T11044] RSP: 002b:00007fab8b214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 765.815317][T11044] RAX: ffffffffffffffda RBX: 00007fab8b214c90 RCX: 0000000000458da9 [ 765.815325][T11044] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 765.815333][T11044] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 765.815341][T11044] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab8b2156d4 [ 765.815348][T11044] R13: 00000000004bf3a9 R14: 00000000004d05d8 R15: 0000000000000004 [ 765.821522][T11044] Kernel Offset: disabled [ 765.961840][T11044] Rebooting in 86400 seconds..