[....] Starting OpenBSD Secure Shell server: sshd[ 31.555871] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 35.040965] random: sshd: uninitialized urandom read (32 bytes read) [ 35.321659] kauditd_printk_skb: 11 callbacks suppressed [ 35.321667] audit: type=1400 audit(1569021139.385:35): avc: denied { map } for pid=6934 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 35.378432] random: sshd: uninitialized urandom read (32 bytes read) [ 35.981261] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.1.13' (ECDSA) to the list of known hosts. [ 41.452828] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/20 23:12:25 fuzzer started [ 41.653947] audit: type=1400 audit(1569021145.715:36): avc: denied { map } for pid=6943 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 42.533209] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/20 23:12:27 dialing manager at 10.128.0.105:35365 2019/09/20 23:12:27 syscalls: 2472 2019/09/20 23:12:27 code coverage: enabled 2019/09/20 23:12:27 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/20 23:12:27 extra coverage: extra coverage is not supported by the kernel 2019/09/20 23:12:27 setuid sandbox: enabled 2019/09/20 23:12:27 namespace sandbox: enabled 2019/09/20 23:12:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/20 23:12:27 fault injection: enabled 2019/09/20 23:12:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/20 23:12:27 net packet injection: enabled 2019/09/20 23:12:27 net device setup: enabled [ 44.781895] random: crng init done 23:14:04 executing program 5: delete_module(&(0x7f0000000000)='vmnet0\x00', 0x200) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/relabel\x00', 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x8041, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f00000001c0)={0x13, 0xfffffffffffffffe}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@remote, @in=@initdev}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) r2 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffb, 0x200000) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000380)) socket$tipc(0x1e, 0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0x9, 0x81000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000480)={0xffffffffffffffff}, 0x111, 0x32a128b651b014ed}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000500)={0x6, 0x118, 0xfa00, {{0x2, 0x2, "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", 0x33, 0x2, 0x401, 0xff, 0xae3a, 0x9977, 0x1f, 0x1}, r4}}, 0x120) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0xfff) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vcs\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000680)=0xffff, 0x4) r6 = syz_open_dev$radio(&(0x7f0000000980)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000a40)={0x0, 0x5377}, &(0x7f0000000a80)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000b40)={r7, 0x68, &(0x7f0000000ac0)=[@in6={0xa, 0x4e24, 0x5, @rand_addr="43d59de7b72b6727f79ecd29ff933087", 0x8}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e21, @rand_addr=0xf9e}, @in6={0xa, 0x4e23, 0x101, @loopback, 0x2}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}]}, &(0x7f0000000b80)=0x10) r8 = syz_open_dev$cec(&(0x7f0000000bc0)='/dev/cec#\x00', 0x0, 0x2) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x1) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000c00)='/proc/self/net/pfkey\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000c40)={0x0, 0x37f}, &(0x7f0000000c80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r9, 0x84, 0x6, &(0x7f0000000cc0)={r10, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000d80)=0x84) r11 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/qat_adf_ctl\x00', 0x802, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r11, 0x3) r12 = syz_open_dev$binder(&(0x7f0000000e00)='/dev/binder#\x00', 0x0, 0x2) fcntl$getownex(r12, 0x10, &(0x7f0000000e40)) write$tun(r9, &(0x7f0000000e80)={@void, @val={0x2, 0x1, 0x6, 0x100000001, 0x9, 0xfffffffffffffc01}, @ipx={0xffff, 0xb8, 0x7a400000000, 0x14, {@random=0x1, @current, 0xffff}, {@random, @broadcast, 0x5}, "619ec126ecd8f6067d96daaad696bedfe4115e282c731d44ff0e73b470e5014d810403a16a686e542cf0019aba3b82bdd1eefe154641ccbc93c25434baaec485d19a9648d5390afc49a1e6ceeeabb24e3cbaf33f7112e132f47207435bdfabd071e36ade507122866512217ab4be621e6f4b04780cebf3a0c4d16b4aa82cece5e163dfef5f97599f4689e097368d334883eec743a109a58edacb"}}, 0xc2) r13 = accept4(r0, &(0x7f0000000f80)=@xdp, &(0x7f0000001000)=0x80, 0x80800) ioctl$sock_bt_hidp_HIDPCONNDEL(r13, 0x400448c9, &(0x7f0000001040)={{0xf58, 0x400, 0x1, 0x3, 0x49f, 0x10000}, 0x101}) 23:14:04 executing program 0: ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f0000000000)={0x0, 0x3, 0x1012}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r0 = getpgrp(0xffffffffffffffff) migrate_pages(r0, 0x9, &(0x7f0000000040)=0x5b, &(0x7f0000000080)=0x2) r1 = getegid() r2 = getegid() r3 = getegid() setresgid(r1, r2, r3) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x200, 0x0) connect$ax25(r4, &(0x7f0000000100)={{0x3, @default, 0x6}, [@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r5 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x800) setsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f00000001c0)={0x8d, 0x4, 0x2, 0x2}, 0x6) setpriority(0x3, r0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x1, 0x0) r7 = getuid() r8 = getgid() fchown(r6, r7, r8) ioctl$TCSBRK(r4, 0x5409, 0xffffffffffff256a) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r9 = request_key(&(0x7f00000012c0)='blacklist\x00', &(0x7f0000001300)={'syz', 0x3}, &(0x7f0000001340)='/dev/net/tun\x00', 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="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", 0x1000, r9) r10 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000001540)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000001680)=0xe8) mount$9p_rdma(&(0x7f0000001380)='127.0.0.1\x00', &(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)='9p\x00', 0x18010, &(0x7f00000016c0)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@rq={'rq', 0x3d, 0xb3}}, {@timeout={'timeout', 0x3d, 0x3ff}}, {@sq={'sq', 0x3d, 0x5}}, {@rq={'rq', 0x3d, 0x8001}}, {@rq={'rq', 0x3d, 0x2}}, {@timeout={'timeout', 0x3d, 0x9}}, {@timeout={'timeout', 0x3d, 0xff}}], [{@fsmagic={'fsmagic', 0x3d, 0x2ddd}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'blacklist\x00'}}, {@uid_gt={'uid>', r10}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cpusetmime_typeem1em0^eth0GPL'}}, {@obj_type={'obj_type', 0x3d, 'user\x00'}}, {@fowner_lt={'fowner<', r11}}, {@dont_appraise='dont_appraise'}, {@fowner_lt={'fowner<', r12}}, {@euid_gt={'euid>', r7}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}}) connect$bt_l2cap(r4, &(0x7f00000018c0)={0x1f, 0x6, {0x0, 0x3, 0x7, 0x1ff, 0x7f, 0x1000}, 0xe9a, 0x3}, 0xe) recvfrom$rose(0xffffffffffffffff, &(0x7f0000001900)=""/219, 0xdb, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000036c0)=[{{&(0x7f0000001a00)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/212, 0xd4}], 0x2, &(0x7f0000002bc0)=""/19, 0x13}, 0x2b60}, {{&(0x7f0000002c00)=@l2, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002c80)=""/181, 0xb5}, {&(0x7f0000002d40)=""/1, 0x1}], 0x2, &(0x7f0000002dc0)=""/218, 0xda}, 0x100}, {{&(0x7f0000002ec0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000003600)=[{&(0x7f0000002f40)=""/117, 0x75}, {&(0x7f0000002fc0)=""/235, 0xeb}, {&(0x7f00000030c0)=""/194, 0xc2}, {&(0x7f00000031c0)=""/119, 0x77}, {&(0x7f0000003240)=""/212, 0xd4}, {&(0x7f0000003340)=""/178, 0xb2}, {&(0x7f0000003400)=""/20, 0x14}, {&(0x7f0000003440)=""/145, 0x91}, {&(0x7f0000003500)=""/11, 0xb}, {&(0x7f0000003540)=""/175, 0xaf}], 0xa}, 0x7}], 0x3, 0x2, 0x0) getsockopt$netrom_NETROM_T2(r13, 0x103, 0x2, &(0x7f0000003780)=0x4, &(0x7f00000037c0)=0x4) 23:14:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xa3e, 0x0) r1 = memfd_create(&(0x7f0000000000)='}#*nodev\xee\xb8em2N,\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 23:14:04 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000280)='/dev/loop0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='fuseblk\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000340000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 23:14:04 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x20000000}) close(r0) 23:14:04 executing program 4: getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000240)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) [ 140.245073] audit: type=1400 audit(1569021244.305:37): avc: denied { map } for pid=6943 comm="syz-fuzzer" path="/root/syzkaller-shm450282247" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 140.291289] audit: type=1400 audit(1569021244.325:38): avc: denied { map } for pid=6960 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13694 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 140.680970] IPVS: ftp: loaded support on port[0] = 21 [ 141.582722] chnl_net:caif_netlink_parms(): no params data found [ 141.612161] IPVS: ftp: loaded support on port[0] = 21 [ 141.625176] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.632186] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.639706] device bridge_slave_0 entered promiscuous mode [ 141.649513] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.655995] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.662977] device bridge_slave_1 entered promiscuous mode [ 141.691405] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.702285] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.724697] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 141.732083] team0: Port device team_slave_0 added [ 141.739639] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 141.746930] team0: Port device team_slave_1 added [ 141.752574] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 141.761184] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 141.761967] IPVS: ftp: loaded support on port[0] = 21 [ 141.831995] device hsr_slave_0 entered promiscuous mode [ 141.870363] device hsr_slave_1 entered promiscuous mode [ 141.913693] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 141.933812] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 141.963138] chnl_net:caif_netlink_parms(): no params data found [ 142.009709] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.016299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.023188] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.029512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.042773] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.049167] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.056907] device bridge_slave_0 entered promiscuous mode [ 142.064039] IPVS: ftp: loaded support on port[0] = 21 [ 142.074261] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.080795] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.088108] device bridge_slave_1 entered promiscuous mode [ 142.139987] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.150186] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.172700] chnl_net:caif_netlink_parms(): no params data found [ 142.187310] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.194587] team0: Port device team_slave_0 added [ 142.212731] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 142.221345] team0: Port device team_slave_1 added [ 142.226874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 142.237881] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 142.272838] IPVS: ftp: loaded support on port[0] = 21 [ 142.313005] device hsr_slave_0 entered promiscuous mode [ 142.350424] device hsr_slave_1 entered promiscuous mode [ 142.424999] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 142.432160] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 142.448158] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.455454] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.462976] device bridge_slave_0 entered promiscuous mode [ 142.476605] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.483334] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.490530] device bridge_slave_1 entered promiscuous mode [ 142.505418] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.511859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.518447] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.524815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.554061] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.564857] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.610977] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.618078] team0: Port device team_slave_0 added [ 142.645276] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 142.651547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 142.657817] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 142.664968] team0: Port device team_slave_1 added [ 142.670811] chnl_net:caif_netlink_parms(): no params data found [ 142.679985] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.686936] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.694004] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 142.712285] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.718880] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.731248] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 142.739089] IPVS: ftp: loaded support on port[0] = 21 [ 142.749651] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 142.762686] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 142.783660] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 142.803920] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 142.810124] 8021q: adding VLAN 0 to HW filter on device team0 [ 142.843165] device hsr_slave_0 entered promiscuous mode [ 142.880436] device hsr_slave_1 entered promiscuous mode [ 142.940746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.947810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.961293] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 142.971747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 142.979007] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 142.986185] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 142.999724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.007718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.015714] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.022070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.028962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.036747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.044373] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.050740] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.059218] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 143.083627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.104319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 143.113500] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 143.128706] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 143.170972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 143.182376] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 143.196684] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.203522] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.212695] device bridge_slave_0 entered promiscuous mode [ 143.220845] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 143.229711] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 143.236981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.244737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.252410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.260384] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.267940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.276200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.283879] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.297500] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 143.303812] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.310598] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.317617] device bridge_slave_1 entered promiscuous mode [ 143.330299] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 143.341833] chnl_net:caif_netlink_parms(): no params data found [ 143.356174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.363457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.371847] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 143.378024] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.385486] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 143.395526] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 143.405328] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 143.426452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.434576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.445224] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 143.452022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 143.467851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 143.488050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.497377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.505242] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.511654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.564830] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.572428] team0: Port device team_slave_0 added [ 143.579237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 143.589102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 143.614335] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.621471] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.629613] device bridge_slave_0 entered promiscuous mode [ 143.636587] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.646108] team0: Port device team_slave_1 added [ 143.653323] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.662556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.670528] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.677611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.684579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 143.696811] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 143.707142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 143.717165] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.724002] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.731727] device bridge_slave_1 entered promiscuous mode [ 143.739852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.749574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 143.757629] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 143.771218] chnl_net:caif_netlink_parms(): no params data found [ 143.783522] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 143.795910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.804376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.812160] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.839696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 143.882537] device hsr_slave_0 entered promiscuous mode [ 143.920546] device hsr_slave_1 entered promiscuous mode [ 143.970742] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 143.978025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.985795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.994790] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 144.011390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 144.036326] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 144.045274] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 144.053322] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 144.065024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.072747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.084301] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 144.098210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.105248] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.112169] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.119907] device bridge_slave_0 entered promiscuous mode [ 144.127171] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.134299] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.145676] device bridge_slave_1 entered promiscuous mode [ 144.162246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 144.169741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.179199] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 144.185479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 144.215791] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 144.224196] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 144.232342] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 144.245751] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 144.254049] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 144.263467] team0: Port device team_slave_0 added [ 144.272630] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 144.282232] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 144.294104] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 144.302147] team0: Port device team_slave_1 added [ 144.308529] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 144.316218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.323252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.332447] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 144.338528] 8021q: adding VLAN 0 to HW filter on device team0 [ 144.356211] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.371293] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 144.379788] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 144.383837] QAT: Invalid ioctl [ 144.398377] team0: Port device team_slave_0 added [ 144.407737] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 144.418079] team0: Port device team_slave_1 added [ 144.420693] QAT: Invalid ioctl 23:14:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00\x96C\xc2:\xf4>~Uph\x9aq\x85\xac\xdaLi\xe4J\x94\xe6\x81d\xc9g+\xba\x03\x00\x00\x00\x00\x00\x00\x00\xbb\xff\xef+\x96>\xadX\x89t\x1d\xf4\xd2\xf9\xb5YS\x05\xdd*id\xb91/\x04\x13\xe4\xdeI\xbd\xc0\xef]\xd8m\xa9\xc7(~\x93F\x89\xb1\x8b#]\x8d\xd7\xca\xca\xab\\\xebo\x17c\x91R\x18\x8fz\x93Y\xa0\x9cP\xef!p\x1d\x12\xfc\xee\xbb\x96\xf5#Ki]>\xf1J\xecS\x14\x15T\xa4\x8b\b\xa6\x1a\xa9P\xc2\x81\xe9Y\xc3\x12Ggr0d\xe9\xbbK.\x9b') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) [ 144.444723] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 144.452867] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 144.475695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.485767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.503433] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.510201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.521848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 144.533416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 144.540880] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 23:14:08 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x100, 0x70bd29, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0xd0}, 0xc0000) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x5, 0x28040) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='status\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) fdatasync(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) [ 144.593530] device hsr_slave_0 entered promiscuous mode [ 144.608114] audit: type=1400 audit(1569021248.665:39): avc: denied { create } for pid=7009 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 144.633459] audit: type=1400 audit(1569021248.665:40): avc: denied { write } for pid=7009 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 144.658388] audit: type=1400 audit(1569021248.665:41): avc: denied { read } for pid=7009 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 144.682928] device hsr_slave_1 entered promiscuous mode 23:14:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000240)={0x7}, 0x7) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r1, 0x2081ff) [ 144.740614] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 144.749640] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 144.761701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.778462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.795341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.804267] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.810703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.818456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 144.829327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 144.867639] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 144.894984] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.901721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 144.911208] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 144.955249] device hsr_slave_0 entered promiscuous mode [ 144.990413] device hsr_slave_1 entered promiscuous mode [ 145.036310] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.043821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.052853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 145.061390] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.069859] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready 23:14:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f00000001c0)) [ 145.090578] audit: type=1804 audit(1569021249.145:42): pid=7019 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir321721907/syzkaller.1nBP2p/3/file0/file0" dev="loop5" ino=3 res=1 [ 145.121216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 23:14:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) [ 145.138692] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 145.159168] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 145.168844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.183990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.191835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.199704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.210883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.217846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.225530] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 23:14:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="17c6000000000000000001000000000000000b400000004c00000060696200"/98], 0x68}}, 0x0) [ 145.242736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 145.253035] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 145.259138] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.267151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.275020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 23:14:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x5c) add_key$user(0x0, 0x0, &(0x7f0000001080)="0e968f812446550afa590809e23edfe82fac0e910217274a6381d464e91270c1fd88a8baef240442a2ebbb5ed94d47be317f273db83e0415", 0x38, 0xfffffffffffffff9) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 145.289036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.304591] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 145.316087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 145.339425] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 145.359063] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.375180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.385150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.397849] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.404282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.419045] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 145.429698] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 145.438323] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 145.445539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.453693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.460941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.469131] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 145.491776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.499519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.508213] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.515589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.531931] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 145.543215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 145.553590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.564558] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 145.571704] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.584302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 145.594977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 145.606118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 145.614431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 145.625257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 145.634271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.642830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.650646] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.656995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.664130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.672512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 145.681516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.689075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.696985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.704225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.714893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.723692] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 145.732994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 145.739758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.747916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.755896] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.762303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.769239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.777007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.786471] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.796124] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 145.806192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 145.815345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.823557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 145.833840] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 145.842325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 145.851275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 145.865980] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 145.873233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.885780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.893342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.904347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.912502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.920702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 145.929688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.937409] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.946293] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.957172] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 145.963726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 145.974624] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 145.984834] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 23:14:10 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 23:14:10 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000280)='/dev/loop0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='fuseblk\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000340000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 145.992065] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.999643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.009800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.026952] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 146.044433] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 146.062959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 146.071213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.078720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.087301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.095186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.103267] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.109875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.118735] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 146.125747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.136810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.159022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 146.174437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.183022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.191233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.198792] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.205193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.220157] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 146.229467] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 146.238104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.247030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.257906] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 146.278191] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 146.288445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.299309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.307202] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.316883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 146.325936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.334079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.343785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 146.352002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.359519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.371379] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.384867] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 146.393248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.405802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.417373] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 146.425040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.441909] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 146.454392] 8021q: adding VLAN 0 to HW filter on device batadv0 23:14:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) [ 147.762199] audit: type=1400 audit(1569021251.825:43): avc: denied { block_suspend } for pid=7101 comm="syz-executor.2" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 23:14:11 executing program 2: clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x132}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:14:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8020000) semget$private(0x0, 0x1, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) setns(r1, 0x0) 23:14:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) setns(r1, 0x0) 23:14:11 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000280)='/dev/loop0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='fuseblk\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000340000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 23:14:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='user.syz\x00') bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 23:14:11 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000280)='/dev/loop0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='fuseblk\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000340000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 23:14:12 executing program 3: add_key$user(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200), 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) socket$packet(0x11, 0x2, 0x300) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) dup3(r0, r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x100, 0x3) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000002c0)=0x800) [ 147.907884] audit: type=1800 audit(1569021251.965:44): pid=7114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16545 res=0 23:14:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet(0x2, 0x4000000000000002, 0x1) syncfs(r1) setsockopt$inet_tcp_int(r2, 0x6, 0x9, &(0x7f00000001c0)=0x73, 0xfffffe15) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e24, @broadcast}, 0x144) setsockopt$sock_int(r2, 0x1, 0x35, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) clone(0x20003ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x40000000005, 0x80, 0x5) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x7d) close(r3) r4 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xa40, 0x105082) r5 = memfd_create(&(0x7f0000000000)='}#*nodev\xee\xb8em2N,\x00', 0x2) pwritev(r5, &(0x7f00000003c0)=[{&(0x7f0000000580)="7854e24ef44944150f3987f6bc58942595adbb09c6fdb83a31090490e7ac98453a45914776c29cbd2873942fd980cae618b8cd81e9de396426173881e685de4dac741f406d3c0ec9d74371c3578bb7c227650c99d9ccf975ae80d836b08cad45dda48e0bae5d4a0f159f9c568f76641387f8e642343f1c8f874dee0bd059a27ea4778fee53918e2e3174bf300586ddb5afa6b4ceedc8088aae01c275020e66f6194d410281049dbfb9c22ea30c06e01366a2ffa20fe4fc9bf169750535538a48d3e0211c64e091e20e5e088a07eb6e29793caec8e9e5e3924f489b0e80c60000000000000000", 0xe8}], 0x1, 0x81000) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x2800002, 0x4812, r3, 0x0) ppoll(0x0, 0xffffffffffffffaf, 0x0, 0x0, 0xfffffffffffffd1b) fcntl$setstatus(r3, 0x4, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0x52698912) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000180)=ANY=[], 0x0) read(r6, &(0x7f0000000840)=""/250, 0x2852b87c) sendfile(r4, r3, 0x0, 0x80005) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000200)=0xc) syz_open_procfs(r8, &(0x7f0000000280)='net/snmp\x00') ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000400)=@generic={0x1, 0x3, 0x4}) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0x1}, 0xf0, 0x0) syz_open_procfs(r8, &(0x7f0000000380)='n\xb1\xfc5k?\x97\xf1\x8e/dev_mcact\x00') openat$selinux_create(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/create\x00', 0x2, 0x0) 23:14:12 executing program 1: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000011000000000000002f00"/26], 0x1a) [ 147.953421] ptrace attach of "/root/syz-executor.2"[7116] was attempted by "/root/syz-executor.2"[7117] [ 147.964560] hrtimer: interrupt took 55237 ns 23:14:12 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0) finit_module(r0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 148.014450] audit: type=1400 audit(1569021252.045:45): avc: denied { create } for pid=7120 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 23:14:12 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xb56a55f1c5ec7df) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000080)={0x0, 0x3, 0x2, 0x1, 0x8}) [ 148.078738] audit: type=1804 audit(1569021252.075:46): pid=7131 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir187506909/syzkaller.jjaKjs/6/file0" dev="sda1" ino=16529 res=1 23:14:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") unshare(0x40600) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) lseek(r1, 0x41, 0x0) 23:14:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setreuid(0x0, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000280)="1b", 0x1, 0x4008010, 0x0, 0x0) sendto$unix(r0, &(0x7f0000000040)="8c", 0x1, 0xf4c039dc4da7666d, 0x0, 0x0) 23:14:12 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFADDR(r1, 0x891c, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', {0x2, 0x0, @broadcast}}) 23:14:12 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) syz_open_dev$sndtimer(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x2ac, 0x0) r3 = gettid() r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) tkill(r3, 0x0) [ 148.225168] audit: type=1804 audit(1569021252.275:47): pid=7121 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir187506909/syzkaller.jjaKjs/6/file0" dev="sda1" ino=16529 res=1 23:14:12 executing program 3: r0 = epoll_create1(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 23:14:12 executing program 2: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) ppoll(0x0, 0x0, &(0x7f0000000640)={0x77359400}, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) fchdir(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) write$FUSE_INIT(r3, &(0x7f0000000000)={0x50}, 0x50) syz_genetlink_get_family_id$team(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d9189) getcwd(&(0x7f0000000340)=""/168, 0xa8) r5 = open(0x0, 0x20141042, 0x0) write$selinux_attr(r5, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'}) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f00000004c0)={0x21, 0x3, 0x0, {0x4}}, 0x21) r7 = socket(0xa, 0x2, 0x0) setsockopt(r7, 0x107, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0x800, 0x0) r9 = add_key$user(0x0, &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180), 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000300)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCGSND(r8, 0x8040451a, &(0x7f0000000740)=""/190) r10 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) ioctl$EVIOCGMASK(r10, 0x80104592, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000540)}) keyctl$negate(0xd, r9, 0x0, 0x0) 23:14:12 executing program 5: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be3484ffc382b", 0x9, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x2, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd", 0x0, 0xfffffffffffffc00, 0x9b, 0x0, 0x2}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000002c0)=0x800) 23:14:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'batadv0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00\x06\bz\x00\x00\x00\xfd\x00', 0xf7fffffffffffffd}) 23:14:12 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) syz_open_dev$sndtimer(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x2ac, 0x0) r3 = gettid() r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) tkill(r3, 0x0) [ 148.481661] IPVS: ftp: loaded support on port[0] = 21 [ 148.490312] protocol 88fb is buggy, dev hsr_slave_0 [ 148.495645] protocol 88fb is buggy, dev hsr_slave_1 23:14:12 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) syz_open_dev$sndtimer(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x2ac, 0x0) r3 = gettid() r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) tkill(r3, 0x0) 23:14:12 executing program 5: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be3484ffc382b", 0x9, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x2, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd", 0x0, 0xfffffffffffffc00, 0x9b, 0x0, 0x2}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000002c0)=0x800) [ 148.574065] device batadv0 entered promiscuous mode [ 148.628870] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 148.640115] protocol 88fb is buggy, dev hsr_slave_0 [ 148.645269] protocol 88fb is buggy, dev hsr_slave_1 [ 148.692767] device batadv0 left promiscuous mode [ 148.718695] device batadv0 entered promiscuous mode [ 148.720131] protocol 88fb is buggy, dev hsr_slave_0 [ 148.728838] protocol 88fb is buggy, dev hsr_slave_1 [ 148.744383] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 148.880155] protocol 88fb is buggy, dev hsr_slave_0 [ 148.885283] protocol 88fb is buggy, dev hsr_slave_1 23:14:13 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xb56a55f1c5ec7df) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000080)={0x0, 0x3, 0x2, 0x1, 0x8}) 23:14:13 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) syz_open_dev$sndtimer(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x2ac, 0x0) r3 = gettid() r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) tkill(r3, 0x0) 23:14:13 executing program 5: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be3484ffc382b", 0x9, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x2, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd", 0x0, 0xfffffffffffffc00, 0x9b, 0x0, 0x2}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000002c0)=0x800) 23:14:13 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:13 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFADDR(r1, 0x891c, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', {0x2, 0x0, @broadcast}}) 23:14:13 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xb56a55f1c5ec7df) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000080)={0x0, 0x3, 0x2, 0x1, 0x8}) 23:14:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setreuid(0x0, r2) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000280)="1b", 0x1, 0x4008010, 0x0, 0x0) sendto$unix(r0, &(0x7f0000000040)="8c", 0x1, 0xf4c039dc4da7666d, 0x0, 0x0) 23:14:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffde8, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="280000001500050000000000000000000100000014000200000000000000000000000000000000018eb08457d9021bdf9d72e8c53bb050bdf13af4c2e1e1fc5cea187db689a2b520bf392cfcdaea022431885373895320c31296a69d2be3f7bf59a13eff20619ff255b82cd3e8ed3a5fe6801bcf74ce8d61fd3ed92f83e3ef4e53fbbd3dcef5e8e25a648d93db871210c3dba615ead6d3e96cb1d97f46b321780379a05f46310916fa94aa14c3a330527569cd39be927a03f508b8e105cd27c6fb8b8e4ae4f8c5ba22f29e2f087269f4778e52443c4cd10ce9f7cb"], 0x28}}, 0x0) 23:14:13 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000000)="f3410fc7b18df6000048b800000080000000000f23d00f21f835100000090f23f83e36f3416f35100000000f22e0c4e1d1f93766b8cb008ee8c4a18dc27874593ef30f0966ba410066ed48b800000000000000000f23c80f21f8350c0020000f23f8c744240000500000c7442402a8d70000c7442406000000000f011424", 0xffffffffffffffbf}], 0xdb, 0xd, 0x0, 0xfffffffffffffe11) ioctl$KVM_RUN(r5, 0xae80, 0x0) 23:14:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, 0x0) [ 149.432178] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 23:14:13 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(r0, &(0x7f0000000280)="2000000012005f0280002000002000000a0000010000000059ec730996af2eb2", 0x20) 23:14:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000002e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/161, 0xa1}, 0x3}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000640)=""/139, 0x8b}, {0x0}], 0x2, &(0x7f0000000700)=""/168, 0xa8}, 0x80000000}], 0x2, 0x0, &(0x7f0000002f00)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa00040, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000300)='\x00\xb3y\xb1\xc4\xc5)\xa3\xc6\x9cjuu\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r3 = dup2(r2, r1) write$P9_RUNLINKAT(r3, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) open(0x0, 0x0, 0x0) 23:14:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x1, 0x4) r1 = socket(0x18, 0x0, 0x3) connect(r1, &(0x7f0000000000)=@sco={0x1f, {0x0, 0x0, 0x0, 0xa30}}, 0x80) setsockopt$sock_int(r0, 0x1, 0x1e, 0x0, 0x0) clone(0x20003ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000500)='./bus\x00', 0x8141042, 0x80) close(r2) r3 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000000)='}#*nodev\xee\xb8em2N,\x00', 0x0) pwritev(r4, &(0x7f00000000c0)=[{&(0x7f0000000480)="a8", 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd0) fcntl$setstatus(r2, 0x4, 0x1) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000740)=ANY=[], 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000680)='lp\xff\xbf\xfco\xd5\xaa\xfe\x1d\x15\xe2\x95Q\x87\xa4\'\xd0\xd8\xe3\xa1\x83\xf2A/\x80x\xe9\x11\x05\x8dOS\xdb\xc7`J\x94X\xbd\x9eXg\x7f\xfdQu\xcd<\xbfi1\xd4\xbbb\xe2\xf3,^\xbc\xbb\b\x8d#%\";+\xb8\xc3\x9ea\xde\xd2,S\xa1\x14\xbd\xe9\n3-\x88B\x1f\xa5\xba\xfc\x9fTZW\vG\xe4\x1a6\xdf\x14o.mU\x94t\x90P\x84\x7f\x16\x89\xf7S\x8e\x12U}[\xa6\xe7\"`\x14\xdf\x04z:', 0x80) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r3, r2, 0x0, 0x80005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000340)=0xb84699fd) r8 = syz_open_procfs(r7, &(0x7f0000000380)='envh&on\x00') r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$sock_SIOCGIFBR(r9, 0x8940, &(0x7f0000000800)=@generic={0x0, 0x8, 0xa82b}) syz_open_procfs(r7, &(0x7f0000000640)='ne\x8e/dev_mcast\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000400)='SEG6\x00') r10 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/4\x00\x15\x16oU\x8a;\x1a\xc13\x83\x1dU1ze\xd3\xe6\xba[=\xbd\xd0/\xe8,:\x02h\xd3\x86\xa4\xbd\xf1\x99\v\xedP\xdaX\xb2\xcb\xa6\x93oR1\x80B\xcfW:\xc7W\x826\x9e\xde,\xb57\x95R\x84\xb0I\xfe\xe3\xc4\x9e9\xce\xa6\x8c\xaaM\xfe\x8dd\xd3\x9e\xc02\xb7],\xb1#\xce\x17\x87\x99V\xd2\x14\xfb\f\x84\xee\x93\x94o\xa6\x95nS\x16l\xec\x14r\xa9%fY\x12\xec\xb5\f\xd5\x87\x88JF)\xcb\b\xa9\xafp\x82\xa4\xa3o\xbf\xe0\xf8Y_\xfc\xbeZ=\tVD\xd4ey\xe3\xc1\xf0\xa3\xc8\xa4Q`Nj\x04\x1a.\xdd\xe0X\xa1\xaah\x83\xd72\xd5\xa2:\x8ec\x01') lseek(r10, 0x20400000, 0x0) write$P9_RXATTRWALK(r10, &(0x7f0000000000)={0xf}, 0x20000327) sendmsg$SEG6_CMD_GET_TUNSRC(r10, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8201000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[]}, 0x1, 0x0, 0x0, 0x20011804}, 0x4) io_setup(0x0, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x6, r0, &(0x7f0000000700)="938b3dfaa643c8cc53761a305254b25bb0bfc827dab4771faab076dddb46fcafeac5fd7a5f3a0ce6e5c7df1f2c324f03fa2a9b8e011c8bc8a6be909dd141f43dd23e4f0d12c0f8141e6589341430f200363d3f93699495b29d969f5cb1845fbb5c5f287464183198aeaeb116a3505c98fda7e11084365c0659c6608e2ad22c3624bd9ff44fc098865348f900000000000000", 0x92, 0x8, 0x0, 0x1, r8}, 0x0) ioctl$VT_WAITACTIVE(r6, 0x5607) 23:14:14 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, &(0x7f0000001540)) 23:14:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x12b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:14:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "270a2274179f9507646ca996fa9cce10cce4e0886d9501f11684b86b43044738a761c09cfc08add7d9ef4d2e949aee8d8a116d1f298976a1fce507407676d0a7172416ad721df78b00"}, 0x285) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x27) r2 = memfd_create(&(0x7f0000000140)='#em1#+\x10', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 23:14:14 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, &(0x7f0000001540)) 23:14:14 executing program 1: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be3484ffc382bc28cfaa03c956bd38ac9", 0x13, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd", 0x0, 0xfffffffffffffc00, 0x9b, 0x0, 0x2}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) socket$inet(0x10, 0x0, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) dup3(0xffffffffffffffff, r2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x200, 0x0) open(0x0, 0x14104a, 0x0) 23:14:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x100000400000003a) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="8200", 0x2}], 0x1}}], 0x1, 0x8000) write(r1, &(0x7f0000000180)="00f300000000008f2a5f3259faa90000000000000000", 0x16) [ 150.097683] audit: type=1400 audit(1569021254.155:48): avc: denied { map } for pid=7292 comm="syz-executor.5" path="/dev/loop0" dev="devtmpfs" ino=14036 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 150.245347] audit: type=1400 audit(1569021254.305:49): avc: denied { map } for pid=7314 comm="syz-executor.0" path=2F6D656D66643A23656D31232B10202864656C6574656429 dev="tmpfs" ino=27572 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 23:14:16 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:16 executing program 1: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be3484ffc382bc28cfaa03c956bd38ac9", 0x13, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd", 0x0, 0xfffffffffffffc00, 0x9b, 0x0, 0x2}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) socket$inet(0x10, 0x0, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) dup3(0xffffffffffffffff, r2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x200, 0x0) open(0x0, 0x14104a, 0x0) 23:14:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:14:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') semtimedop(0x0, &(0x7f0000000280)=[{0x0, 0x4, 0x1000}], 0x1, 0x0) setns(r1, 0x0) 23:14:16 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000040)={0x0, 0x0, 0x100d}) 23:14:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/mcfilter\x00') preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/235, 0x33}], 0x1, 0x0) 23:14:16 executing program 1: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be3484ffc382bc28cfaa03c956bd38ac9", 0x13, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd", 0x0, 0xfffffffffffffc00, 0x9b, 0x0, 0x2}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) socket$inet(0x10, 0x0, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) dup3(0xffffffffffffffff, r2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x200, 0x0) open(0x0, 0x14104a, 0x0) 23:14:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) 23:14:17 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca52daa2216ca7bf070") fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000000)) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x400000000003, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x3aa, 0x0) recvmmsg(r0, &(0x7f0000002cc0)=[{{0x0, 0xfffffffffffffe22, 0x0, 0x0, 0x0, 0xce0623470ca0d56}}], 0x1ece87a4671555d, 0x0, 0x0) 23:14:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_procfs(0x0, 0x0) fchdir(0xffffffffffffffff) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)=""/249) 23:14:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() timer_create(0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x1, 0x1) waitid(0x1, 0x0, &(0x7f0000000280), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) close(r2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000040)=""/12) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x1}, {}, {}], 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r4 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4100, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) 23:14:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f00000084000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x7a, &(0x7f00000001c0)={@random="31dd9638e37f", @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "a1bba9", 0x44, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000]}, @local, {[], @gre={{0x0, 0x501, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8864}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}}}}}, 0x0) 23:14:19 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:19 executing program 2: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be3484ffc", 0x7, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x2, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd", 0x0, 0x0, 0x0, 0x0, 0x2}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 23:14:19 executing program 4: 23:14:19 executing program 5: 23:14:19 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() timer_create(0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x1, 0x1) waitid(0x1, 0x0, &(0x7f0000000280), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) close(r2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000040)=""/12) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x1}, {}, {}], 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r4 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4100, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) 23:14:19 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() timer_create(0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x1, 0x1) waitid(0x1, 0x0, &(0x7f0000000280), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) close(r2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000040)=""/12) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x1}, {}, {}], 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r4 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4100, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) 23:14:19 executing program 4: 23:14:19 executing program 5: 23:14:19 executing program 2: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be3484ffc", 0x7, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x2, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd", 0x0, 0x0, 0x0, 0x0, 0x2}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 23:14:19 executing program 5: 23:14:19 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:19 executing program 4: 23:14:19 executing program 4: 23:14:19 executing program 5: 23:14:19 executing program 2: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be3484ffc", 0x7, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x2, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd", 0x0, 0x0, 0x0, 0x0, 0x2}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 23:14:19 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() timer_create(0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x1, 0x1) waitid(0x1, 0x0, &(0x7f0000000280), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) close(r2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000040)=""/12) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x1}, {}, {}], 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r4 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4100, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) 23:14:19 executing program 5: 23:14:19 executing program 0: 23:14:19 executing program 4: 23:14:19 executing program 2: 23:14:19 executing program 5: 23:14:19 executing program 2: 23:14:22 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:22 executing program 4: 23:14:22 executing program 5: 23:14:22 executing program 0: 23:14:22 executing program 2: 23:14:22 executing program 1: 23:14:22 executing program 5: 23:14:22 executing program 2: 23:14:22 executing program 0: 23:14:22 executing program 4: 23:14:22 executing program 1: 23:14:22 executing program 2: 23:14:25 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:25 executing program 5: 23:14:25 executing program 0: 23:14:25 executing program 1: 23:14:25 executing program 4: 23:14:25 executing program 2: 23:14:25 executing program 1: 23:14:25 executing program 4: 23:14:25 executing program 5: 23:14:25 executing program 0: 23:14:25 executing program 2: 23:14:25 executing program 5: 23:14:28 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:28 executing program 0: 23:14:28 executing program 1: 23:14:28 executing program 4: 23:14:28 executing program 2: 23:14:28 executing program 5: 23:14:28 executing program 0: 23:14:28 executing program 4: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be348", 0x5, 0xfffffffffffffffe) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x2, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd", 0x0, 0xfffffffffffffc00, 0x9b, 0x0, 0x2}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 23:14:28 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000140)={0x1}, 0x8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f00000032c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2400ffe0) sendmsg$inet6(r0, &(0x7f00000008c0)={0x0, 0x183, &(0x7f0000000080), 0xe4}, 0x4000000) 23:14:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000000c0)="240000001e005f0214fffffffffffff80700000000000000000000000800080000000000", 0x3db) 23:14:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='environ\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 23:14:28 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) 23:14:28 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000540)='/dev/capi20\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000180)={'broute\x00'}, &(0x7f0000000200)=0x78) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ba}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) rt_sigreturn() 23:14:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x4) ftruncate(r3, 0x1000000) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) r6 = memfd_create(0x0, 0x0) pwritev(r6, &(0x7f0000000340), 0x0, 0x81805) dup3(r5, r6, 0x40000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r7 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x35, 0x0, 0x0) 23:14:28 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x400, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000180)=0x7) prctl$PR_GET_FP_MODE(0x2e) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000080)={0x1000, 0x3, 0x2c, "a2bd97be561913279c7ff9f49e36829ca09cc97103e777497015ec8154ed3bb7341f216098fea7ba8352cdaa92c9d51458b1247ac9a802c95d6b603d", 0x1e, "c48a52670f3db42f1ff37bf29ad99e6fcb713c800611e67e0897f90f8ee9b70b6de7392e13d5d7494f2a592ea3d6a4579607c5842b01ba6952951b43", 0x10}) syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd6076605100300000ff010000000000000000000000000001ff020000000000000000000000000001860090780007080060c5961e000000000704000000000000180300000500000100000000000000000000000000000001"], 0x0) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f00000001c0)={0x0, @adiantum}) 23:14:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x50, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xf0}, @IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x50}}, 0x0) prctl$PR_GET_SECUREBITS(0x1b) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x25c000) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) fcntl$setstatus(r3, 0x4, 0x42800) r4 = socket$inet6(0xa, 0x1e, 0xfffffffffffffffc) r5 = memfd_create(0x0, 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x81805) fcntl$getflags(r5, 0xb) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$KVM_SET_DEBUGREGS(r6, 0x4080aea2, &(0x7f0000000280)={[0xd000, 0x2000, 0x10000, 0x1d005], 0x66a, 0xc1, 0x100000000000}) r7 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r7, 0x9201) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r7, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000180)=0x4) close(r4) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x200004) sendfile(r4, r8, 0x0, 0x80001d00c0d0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f00000000c0)=r8) r9 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r9, 0x9201) ioctl$DRM_IOCTL_GET_UNIQUE(r9, 0xc0106401, &(0x7f00000003c0)={0x8b, &(0x7f0000000300)=""/139}) 23:14:29 executing program 0: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}, 0x10) r0 = gettid() getpriority(0x1, r0) 23:14:29 executing program 0: r0 = gettid() r1 = inotify_init1(0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000004c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000400)="a70cefcd76bc4427571752223dca4e128a9f73dd349c36ad199e02fb622693812b107633d93e5c2d1c6063ee312d4dbec3b58b5a6faa070f976047b4547ccdc298085ca86b4fc2a7d6602d3c32cd5955a15b232b39f07bd1dc39f23e524ecaa76a5f67e3a7b6d0aa2ea666a8218953153d4719ab7300504f79a225ce4ce43a70290126176991c7ada5f040b3718be55b47d1ab2c632aaefce55a150bf9fdd10128c4f24865ad7bd97364d7ca1d1e08ce00045571e54f", 0xb6, r1}, 0x68) fcntl$setown(r1, 0x8, 0xffffffffffffffff) r2 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @multicast2}, &(0x7f0000000540)=0x10, 0x80000) ioctl$sock_netdev_private(r2, 0x89fb, &(0x7f0000000580)="b7a519dfc42b9defe605f7ca48159aee822d68f914f958e1c0f1aa85d6eef543106bc9fcf164fa6e0ae2f04b177602aa4bf78ac36a69ad061a12c302e002fa735b2ee5d18ce48b893bade9bc45e1c4eacdf90d7590579d6bd7ec9cbe3fa401ec969b871e6e13f7f350a9680a6348fc4513888d32d35319a09741bbc4e487f3840113d53171c3fd68cc9f3c426d1e4333cbb864449b0c0cfec4e6050a9d5627fca47af31e3d8b98b17398196f36e44f9481") fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video0\x00', 0x2, 0x0) kcmp(r0, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r5, 0x9201) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000000)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000100)=0xe8) socket$bt_bnep(0x1f, 0x3, 0x4) statx(r4, &(0x7f00000003c0)='./file0\x00', 0x800, 0x40, &(0x7f0000000200)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f0000000340)={0x4, [0x0, 0x0, 0x0, 0x0]}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='threaded\x00', 0x9) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000180)={r6, 0xa25d, 0x5, 0x1, 0x7, 0xd52, 0x3}) 23:14:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) getsockopt(r0, 0xff, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="e8c3433ec01c8290c51c3c", 0xb}, {&(0x7f00000000c0)="18040091d4a7b839c48bb29735f5e8d81b5c8c544a42f2b09d78b08d2fb564c22b70dc4424a9341e73a292d198748bde53a779a8617961bc66fc4d521277b1cd08839b0bc9d396166b76", 0x4a}, {&(0x7f0000000140)="77bb26512d4f0053587d9d631be01586c56c3dc39f430660d055ee1158ebe8bfba9df4345bb79fb49e9774d354ffe7e00e198d474fee6d976677aaffb76f0628d2954481d250052590ac9d9cd6f5642e9a55d6f3f1b5e6fff82d4b0921f1770ff34494db37c69b1f3eba1a902399", 0x6e}], 0x3, &(0x7f0000000200)=[{0xa8, 0x10e, 0x4, "5e0de6d213fdef763c22f3fc358fbbb3d6a261ded50268dc0f8d5f9fa749c56e55c5c2b327081a7ae6a8952b619db18b47b2dcbddb4049f796b5b7a7e7417734a80cfb9af4507db022191cc59c277faac4e6953a0cbe41ef6cef713c15aae7cdf86630a561d66477e2fe18b514af24402be5500d0e201cdc3dfe83061fbb897ad19de8bca3aa2cbb6efc26ba65bcf57e417a9f8691bc"}], 0xa8}, 0x4000080) 23:14:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000040)={'veth1_to_hsr\x00', @ifru_flags=0x200}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'bond0\x00\x00Z\x00', @ifru_ivalue=0x20b17d7b}) ioctl$sock_ifreq(r0, 0x4000000000089f0, &(0x7f0000000000)={'sit0\x00\x00\x00\x04\x00', @ifru_flags}) 23:14:29 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'wzz1\x80\x00\x00\x00\b\x00\x00\xd5\x00\x00\x00\x00\x02\x00\x00[\xdb\x01\x003\x8a}\xe0\x00\x00\x00\xf0\"\xbe\x16{\x00'}, 0x2, 0x8000608, 0x2000000000005, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r5 = syz_open_dev$cec(&(0x7f00000004c0)='/dev/cec#\x00', 0x3, 0x2) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000500)=0xfffffffffffffbc7, &(0x7f0000000540)=0x2) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000003c0)={@dev={0xfe, 0x80, [], 0x1d}, 0x46, r6}) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) fcntl$getownex(r3, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000280)={{0x6, 0x1, 0xc35, 0x2762, 'syz0\x00'}, 0x3, 0x0, 0x1b9, r7, 0x5, 0x7, 'syz0\x00', &(0x7f0000000080)=['syz0\x00', '\x00', 'syz0\x00', 'syz0\x00', '/dev/snd/controlC#\x00'], 0x23, [], [0x5, 0x8, 0x1]}) 23:14:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x239, &(0x7f00000bfff0)={&(0x7f0000000100)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000fe00000000000000000000007f9b772a13303800000000000000000000000000000000000000000000000000000000000000000000008cee251c9caaf000000000000000000000000000040082dbc66b00"/122], 0x4}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000200)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x20) [ 165.287403] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! [ 165.471449] snd_dummy snd_dummy.0: control 0:0:0:wzz1€:0 is already present 23:14:31 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:31 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000940)='./file0/bus\x00', 0x6210, 0x0) r0 = socket(0x10, 0x2, 0x0) membarrier(0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./file0/bus\x00', r1, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 23:14:31 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = dup2(r0, 0xffffffffffffffff) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000080)=""/45) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) io_setup(0x4, &(0x7f0000000140)=0x0) io_submit(r4, 0x1, &(0x7f00000000c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000180)}]) r5 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCSMRU(r5, 0x40047452, &(0x7f0000000040)=0x3) 23:14:31 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = openat$cgroup_ro(r1, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1ff}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfa0}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xd76}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x85}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0xfc}, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x7fffffff, 0x8, &(0x7f00000004c0)=[{&(0x7f0000000080)="3aa46e7b2a3d7632dbe119a0ad302142accd03f498010e22da53d41ffea025f3f6b7df765182eddf8d9671a36350486cfbd9b39b0520a585721442c625b23c", 0x3f, 0x9}, {&(0x7f00000000c0)="85d5407951af03e5108b8726c03d352458593be067db92eb9723d8c49b3ec47cad901e561700ac98d0c19da2193a5c47f3a526d0e0c962baab2d7a7cf35b2bc12e38141b2af5f1c264d8af4309e993d4e653f067ed5c400116dacc55a7a7696ef9b06cb813497ac9b6d0556ff3c31f93f1e7460b6934cd87036e74b0a7840f28c40142c1c63b3d1a3feed9c14ceec330bc00d1ce739f808130d8af956f6ad80888ec0a3c2c0937c497210b9e1fc5533afb6459bfb185f9fda36257", 0xbb, 0x93}, {&(0x7f0000000180)="cc4cf56f473652b1553b84add982fbae78300b23abb4b024892946c6500f7632d1718319803b79bc241c39f0c5f43f5deb60b5bb3b312cb676a7cf60d7453a10abb79a7ab22370a58b6692cca9f36da6f1fcaeba5417b459bc05bf08755e7fcc8c057769e1fb5273197132b531948f1684620ace8947d090e6ae16940e8ec5648afa5a86545fce23235af78de3414a832c328b50d04baac240f960d0f6da4f25f6a81016a377b9a258108378fc584f1302d9b8cf8f79837c780e3e053b8712", 0xbf}, {&(0x7f0000000240)="2c50f0f17ca6dd7ba92a023e70e5273b88ce11ca9ee54ad8c56df5f2494567c613bb53b05944f8fa2820e714d62f2ac7c66c75833d363814196d6ed5c524e3f36f66943bfd1e9fc357f67a56c6c60d2ff2f55c82f7f2a9ff3c616a6daf4d9e4b3b42e03526de864a48cecc1c5716f56af67ce3ee3c5925dc71a7e34671467a3ac36f43706e77d61db0ca9f1fb17dbaecc7df20b6a309fe84d587479f2cd0fd01e4b74e5506ce2a4fb253eb8aa59c5dd7b331e96bf31f95bf2b01bae7b3523a8520842cebcebc1a80a2082ab0ad9616ebd1a76ea0167d6323bb9c322f189cdc", 0xdf, 0x7ff}, {&(0x7f0000000340)="bbb7008994a7397c3c54e01c8c31091aaf6714ae7188912c1b9db6d45631ab6157f3700cd56b41b45c20ab1cb2abdef297d3", 0x32, 0x2}, {&(0x7f0000000380)="92b7a59e85383b40b3ca35f35f1f341cba63bc1e53f564b23c6961de8d007f37ba3095162e1e7f1f83a23c5dc99358a317eaa463c220e2841e31b77006b4e7f13fe31fb3b3f27aceaf00ebeee0254de0aaacb83eafca918675d703e0ee3701091542372938be7e9b222ddd4415a9d1ade1902410adc8addd7c16948ff8b3", 0x7e, 0x5}, {&(0x7f0000000400)="8bfa334db753c3d885ad256de1941b57dda18183c56ea425d8d693d74e235cb913d51d16626fa2ef83663b972bfc4ba60154914ebfc42a5fba87905d0d016cbf71d0caac98e1ea6db390b12d70c07e9217a9fe47bc78f375a38bef56c612d2bec5983133ca1e7dfbd061bd014bcd6864c071c6e1eecb9229cb10d77f", 0x7c, 0x1}, {&(0x7f0000000480)="aa44d11f6998", 0x6, 0x2000000000000}], 0x10, &(0x7f0000000580)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nouser_xattr='nouser_xattr'}, {@grpid='grpid'}, {@grpjquota='grpjquota='}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x8000000}}], [{@euid_gt={'euid>', r4}}]}) mbind(&(0x7f0000907000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x2, &(0x7f0000c28000)=0x3f, 0x5, 0x0) msync(&(0x7f000074c000/0x4000)=nil, 0x4000, 0x4) 23:14:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="c0dca1055e0bcfec7be070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8, 0x0) ioctl(r1, 0x3, &(0x7f0000000000)="11c5387000000003000000") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r2], 0xfffffe19) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x28, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x8}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000380)=0x9) syz_open_dev$midi(0x0, 0x7f, 0x1601c2) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) write$P9_RLOPEN(r3, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(0xffffffffffffffff, 0x200000000002) r5 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)=0x8f) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') openat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockname$netlink(r6, &(0x7f0000000400), &(0x7f0000000440)=0xc) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) signalfd4(r4, &(0x7f0000000100)={0xffffffffffffffff}, 0x8, 0x0) dup(0xffffffffffffffff) 23:14:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) keyctl$negate(0xd, r1, 0x0, 0x0) open(0x0, 0x0, 0x0) 23:14:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) keyctl$negate(0xd, r1, 0x0, 0x0) open(0x0, 0x0, 0x0) 23:14:32 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40040, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) r2 = syz_open_pts(r1, 0x100) ioctl$VT_WAITACTIVE(r2, 0x5607) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x20, 0x0) ioctl(r3, 0xffffffffffffffb7, &(0x7f0000000000)) 23:14:32 executing program 5: r0 = creat(0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) set_tid_address(&(0x7f0000000240)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x4, 0x100000000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x80000004}) write$P9_RWSTAT(r2, &(0x7f0000000000)={0x7}, 0x7) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast2, @remote}, &(0x7f0000000380)=0xc) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000440)=ANY=[@ANYBLOB="0700000000000000000000000000000005000000000000d98014aec59e8d6ade167b4e5b06b86cc43e8ca05894900cb7f6ebd9014b", @ANYRESHEX, @ANYRES32=r1, @ANYRES32]) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = getgid() fchown(r7, r6, r8) setgroups(0x2, &(0x7f0000000080)=[r8, 0x0]) write$FUSE_CREATE_OPEN(r3, &(0x7f00000002c0)={0xa0, 0x0, 0x7, {{0x1, 0x1, 0x0, 0x2, 0xe5, 0x81, {0x4, 0x4, 0xffffffff, 0x7, 0x8c, 0xff, 0x4, 0xffffffffffff8000, 0x9, 0x1, 0x2, r4, r8, 0xe4, 0x100}}, {0x0, 0x14}}}, 0xa0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000200)) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)}}, 0x18) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 23:14:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x95, 0x400000) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x29) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="540000001900000100000000fbdbdf251d0107000c000b006f7f00003f00000008000d00010000000c000b0001000000090000000800050003fd01071800020000000080080300001b23c0fa4738998179000000625a127ea9d61d0b7ddda23343a31e6359c598989364e14000c84c8f8d000000000000000000000080c77a9c162ba5f9c07c0e30aeeff3be9f479ff2f33fa8d04d846b56c5c8da28dbe32b3466f58e40e2079ef8db4216f7d1315d3b06c8fe2bc7090eaa0b625e3330d042fd5dda9db99dac663050bfc86d308eda381c4bf4e07319"], 0x54}}, 0x0) 23:14:32 executing program 1: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @remote}, 0xc) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)=ANY=[@ANYBLOB="7525820aedb800001400000008004500001c0000f10000119078000000000000000000001f775375679c7b2d79301ffc2eb6b512007c9125a52d0252a7d0032cb2f87e0c8b7b96908f2c"], 0x0) 23:14:32 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x2) accept4(r1, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000180)=0x80, 0x80000) 23:14:34 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:34 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) close(r1) socket$kcm(0x2, 0xa, 0x73) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'bridge_slave_1\x00', @random="01003a1e2410"}) 23:14:34 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = dup2(r0, 0xffffffffffffffff) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000080)=""/45) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) io_setup(0x4, &(0x7f0000000140)=0x0) io_submit(r4, 0x1, &(0x7f00000000c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000180)}]) r5 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCSMRU(r5, 0x40047452, &(0x7f0000000040)=0x3) 23:14:34 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200900, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1400200) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSW(r2, 0x5100, 0x0) 23:14:34 executing program 5: r0 = creat(0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) set_tid_address(&(0x7f0000000240)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x4, 0x100000000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x80000004}) write$P9_RWSTAT(r2, &(0x7f0000000000)={0x7}, 0x7) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast2, @remote}, &(0x7f0000000380)=0xc) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000440)=ANY=[@ANYBLOB="0700000000000000000000000000000005000000000000d98014aec59e8d6ade167b4e5b06b86cc43e8ca05894900cb7f6ebd9014b", @ANYRESHEX, @ANYRES32=r1, @ANYRES32]) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = getgid() fchown(r7, r6, r8) setgroups(0x2, &(0x7f0000000080)=[r8, 0x0]) write$FUSE_CREATE_OPEN(r3, &(0x7f00000002c0)={0xa0, 0x0, 0x7, {{0x1, 0x1, 0x0, 0x2, 0xe5, 0x81, {0x4, 0x4, 0xffffffff, 0x7, 0x8c, 0xff, 0x4, 0xffffffffffff8000, 0x9, 0x1, 0x2, r4, r8, 0xe4, 0x100}}, {0x0, 0x14}}}, 0xa0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000200)) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)}}, 0x18) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 23:14:34 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000}) r6 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r6, 0x9201) r7 = memfd_create(0x0, 0x0) pwritev(r7, &(0x7f0000000340), 0x0, 0x81805) close(r7) write$binfmt_elf32(r1, &(0x7f00000018c0)=ANY=[@ANYBLOB="7f454c460000400000f5ffffffffffffff0200000000000000000000380000000000006086000000000020c500"/60], 0x3c) r8 = socket$inet(0x2, 0x3, 0x7f) vmsplice(r1, &(0x7f00000013c0)=[{&(0x7f00000001c0)="8fe6942c9b0a38d2fd07df7abdc6ade4fcb9bdca", 0x14}], 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000001c0)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r8, 0x0, 0x3, &(0x7f00000000c0)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 23:14:34 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x2}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef622b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae557511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac000000000000", 0x6ae4, 0x4000002, 0x0, 0x25) [ 170.847726] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 23:14:35 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getgid() fchown(r2, r1, r3) setgroups(0x2, &(0x7f0000000080)=[r3, 0x0]) r4 = getgid() getgroups(0x4, &(0x7f0000000000)=[r3, r4, 0x0, r3]) 23:14:35 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB=' U', @ANYBLOB="00000000d42cb92810924fa9e5151401ce646ba1a30a78d3abdf1e15"], 0x2}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 23:14:35 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x6) r1 = socket(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000cc0)=@ethtool_gstrings={0x1b, 0x4}}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x22, 0x0, &(0x7f0000000040)) 23:14:35 executing program 2: timer_create(0x9, 0x0, &(0x7f0000000340)) timer_delete(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000000)=""/140) 23:14:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000000c0)=""/151) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x100000488) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x800) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) [ 171.379651] audit: type=1400 audit(1569021275.435:50): avc: denied { wake_alarm } for pid=7693 comm="syz-executor.2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 23:14:37 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:37 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000000100)) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f00000001c0)=""/4096, &(0x7f0000000080)=0x1000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffb5}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 23:14:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) r5 = memfd_create(0x0, 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x81805) ppoll(&(0x7f0000000000)=[{r3, 0x8}, {r5, 0x40}, {r1}], 0x3, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)={0x3}, 0x8) r6 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:14:37 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000300)={0x283}, 0x96) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x4400) ftruncate(r2, 0xa200) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f00000000c0)='./bus\x00', 0x7fff, 0x4, &(0x7f0000000140)=[{&(0x7f0000000240)="01fec65c02b07ff16cb8d75561a68d4df2452acf020de6acd7a3c894af7756c78be4c3d3fa231d40d1368544b2f5b8bccc096d2e027d285a7c32b43883cfb727d23cb119644dd12a06e58947d18b1f7f59e48e7784f8b707ba892431fb12c7b1079e655c22fa3a35be019be2f21faf4d5fd45341368bf7d0387f1e7ce1e552f99e019f90809c35a485e8be0fe643446f95ddbcd014a5fbd1fb08e069bef49ff961c24bed3c19a3513bbf96ba3c84109a0b95052e2abe772936", 0xb9, 0x8000}, {&(0x7f00000003c0)="260770315871c5e0f84c6cd0d635b9d47c61928c5815872b8af6dfc018a7cb71f7f703a785a12086fa9af44f87a5db59ca13fd5798eafa5a4a79348f5c834032adcf88c1e39ebc9f97153600809b7b693de7c7c29e1aa40d96b8054269505657037da7f75dbe36516ff867b8551d02c748d0295a4b13ce3f340e7596ddd9010365cd3f383a8526fb8a5922fa086b81b3c53508f4eff1ea3781945d79b42ab556a76f9fbcf4779344fc92c06f313b6aab", 0xb0, 0x5}, {&(0x7f0000000480)="fecdfd44ffae415358d1911da1b1909314ad5ef40d091d6856595a592e6b1aec035d3226ae405b06d047fd3d020d28cbd9d841330df5f68bc73c8c07e38900136e552b66bf88c191a8ef5e709fb5da6eb10d3b245fc84f6e7d4903ea645926cd2bd55c585d1376579864301919314c0492ce3db0491c35e9b642b4259cb38c3d8d47be8b2a8f6d7d64424b2c6c8c544d51f288e03ba83ec56f3c5b5352991d821d9ef165a0fcd8a92eb184cf9cf1e7675b455d91c35d79f7ed7af5fd808a05", 0xbf, 0x96}, {&(0x7f0000000540)="de32702fd8b83cb002210c59ab66ae6cc2066b74e1f47800311eff1cbab30a694710c8e688e55baac18de33aeac6a670e025aa7c8568cc1a5bd8ab0a1636bc1f2d7fd0c61d3b8fa344437ff3fdbb7a4ac086d30f46fb2dc2474d312dac34db5a196fbea82a5872ff754b2ebe462e993f9448ccf6f40ac7b2f00bd453fbbffd94f1235e8741194801ae51474a150ce796e4e925ea676fee598d2eef20765966510d0dcaa01f08df0f8b3bbc9f9dcca953136878d615ea2c54e4fc8d314f437ef835a47fcdc9eeef4bd44884439bc59a0282926d09a396c2ad4b205e9ec8d8a9eeec76ad8dabc45ffd7a6a0bc23cd6b5ac2590431127b279", 0xf7, 0x81}], 0x2100000, &(0x7f0000000340)='\x00') 23:14:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) getpeername$netrom(r3, &(0x7f00000000c0)={{0x3, @bcast}, [@default, @null, @remote, @null, @rose, @rose, @null, @default]}, &(0x7f0000000140)=0x48) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="34020000de0201dc8427afddabac5af857ac152ce69cdac3b039090e650f3433b98e723f8d611250587984d613ec44db29094093ad", @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESHEX], @ANYRES64=r0], 0x3}, 0x1, 0x0, 0x0, 0x40850}, 0x0) 23:14:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@dev, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) bind$packet(r0, &(0x7f0000000140)={0x11, 0x1b, r1, 0x1, 0x0, 0x6, @local}, 0x14) 23:14:38 executing program 4: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x440000, 0x0) write$selinux_attr(r2, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) fcntl$setflags(r3, 0x2, 0x1) sendfile(r1, r2, &(0x7f0000000300), 0x2008000fffffffe) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) ftruncate(r5, 0x1ffffd) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$VIDIOC_G_PARM(r5, 0xc0cc5615, &(0x7f0000000340)={0x7, @raw_data="d488b604822509b9388bfcfb131cbaf217fa6c6b93d900b0a2a224c5abdbf662f5973f9645ef36598f5ff3450fa98da9bfdebd450ff52a1c8e0c101a9095a7b1b40b82a4d8ee90361ca5116f76e463403bf84dbf0c2d8179916c800cea9de5610bb4393b0fd9bb06a974a5ffd4d544a94a825644719b6086521e889410bf05db41da0faed708174e5b641fe9526386569ecdcc28552e188291b38e99fbcd0b88dabece4fdd7f76b8f65da2ac14d459df0ce6411dde20d66b905922bd404a336340238dc552e3489d"}) read(r1, &(0x7f00000001c0)=""/102, 0x66) r8 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x200004) r11 = socket$inet6(0xa, 0x400000000001, 0x0) close(r11) r12 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r12, 0x200004) sendfile(r11, r12, 0x0, 0x80001d00c0d0) r13 = socket$can_raw(0x1d, 0x3, 0x1) sendfile(r13, r12, 0x0, 0x80001d00c0d0) write$9p(r10, &(0x7f0000000440)="0a665e72e89ec12ec2151066f493101fedc38d265bf85a315aeafb47cca15998fa0673842cfcb78f811b43ec72cb8fcb45db01d11d386574ac7a0fe8d1295e39fb39d97fcb6ef94b8c3e0512e6cce17b0da5fd8bd14d999026a10800135c9f99787f055baa725d9eac95e9a7a4672c656ab12d54cf549091c139f577d983c9032303ccfa8bcf2571", 0x88) ioctl$MON_IOCQ_URB_LEN(r8, 0x9201) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000280)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1}) ioctl$CAPI_MANUFACTURER_CMD(r8, 0xc0104320, &(0x7f0000000100)={0x10000, &(0x7f0000000000)="ef190e0f9ff055d185419bea9542e7cd8b33ddd4fd8b9091a1513990764b96966b69adb9027873759c516fdadce9af8108295ca3eea2791bb9a9d04eda507977c84fc4c31be29ec6eadea467dc0f613e92e55de1aa9ee8ea44c6b9b8e18736115a929f2d16de369d285d210fed6ace51c002c516b9a0fe1d20fb7e4351a1530ae3960c06217afe48fcc04afe1226943d3c7c9950f753ffe285d3e8080077048cd350c698aa42012d204c9adb7504c6f72d4ef265fb65ca19adbd1ac89c27247b61bdde0085ff291f5c33ea024ea69ed0b227d8a6cbc9958fe811006b96c5d1e88b09a28764"}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x10000, 0x0) 23:14:38 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d96927940000e3fffff800004000000000ed08691ff9dc0300df7726550100000005000040234736"], 0x3c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8002, 0x0) r3 = gettid() r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) r6 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = getgid() fchown(r8, r7, r9) setgroups(0x2, &(0x7f0000000080)=[r9, 0x0]) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x38) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r10, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = gettid() ptrace$setopts(0x4206, r13, 0x0, 0x0) tkill(r13, 0x38) ptrace$cont(0x18, r13, 0x0, 0x0) ptrace$setregs(0xd, r13, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r13, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000880)=0xe8) fstat(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r2, &(0x7f00000009c0)={&(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000240)="ef0869d5d74b609a7b54dcfb5cd4fa1c5ed719317404433cda2228ef9e346393a81661d110f0c92dd58ef3e2c66fd24be54d6d716d51d39474c4b890d98e4680bc579a82ca8f24ff09942ba4b23572174025ed0416bcac63ea37a617b194b023ee90b3aa493f06445ef4de312cd7e836d15c09459b2c201b99cb52888231d03ca43f429cf623aba55181e6cc3c6112899aef849b0dd6abd7dc81d68fa8ddea31e373899f0ffef59d37e677066e6f361d33ef26eddea5dab92f4cf1bd70afc5ed2f8c0e4175d315d4cdff4a618fd55b0bd4bf91e7f1fcead5af96351bf6be60ee", 0xe0}, {&(0x7f0000000340)="e9974d0be510dd542cad5b69d2c3bfe02f05d7c22e99fca02edbebd8c55de978388fb6b4f2cb3a074f00aa158f268e9d78da8b51b9d425c2b84972c19380d059d11170780439010da7af646791df5b58609a2863d9251a161981da381d553ef475f71d31b0b60831ad6291befa84a234aa99dd95d3de5d55600c405951234c5f8b07c68c2cbb59af46ec9f866e78b9e810adcd464141", 0x96}, {&(0x7f0000000400)="7bec1ff88785bb708e69d20295fa7cce1b568ddbc4adedbe3e54058610f86f6315ebf24c244d2bcdc10ef4fdbab7397e67dacac6053d8f29ba5038830d93f3e282175db2a573a753098b02852be262641556484cdf912245cfbb797f17529d3819d8b43ee420632f33cf2c795ec41759ecbb93ef9726e6fa20554882490ca9288d6eedc7933eeed9fc62289ac1cbc73fd2d8c3e858cd988adc9581c20b5333ec14f37bff5703619fc0e8c8238c4f9f2394962ae1bacfd179461a722be90621d44348a4164723594ba25482dc4d11a3a0f21394601218c2306121529795d9255c18d072ae03ed770bf6fa781128ba58b234065d", 0xf3}, {&(0x7f0000000500)="7ed3904a02664fe4484e7b50322e85da8af80176fa1ccf34d7e2634d380446f4f628c261fd47c74d8b555c62d749335e2fb74e63540f1b3b9c219887", 0x3c}], 0x4, &(0x7f0000000940)=[@cred={{0x1c, 0x1, 0x2, {r3, r5, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}], 0x60, 0x20000000}, 0x4880) 23:14:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x101000) r2 = memfd_create(0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) pwritev(r4, &(0x7f00000000c0)=[{&(0x7f0000000080)="a61f9d8612840fefc92d6ae564236fedb5240ef147750067a879f10316628dd93ac5c692420f4f4371c1de57"}], 0x10000000000001fa, 0x1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000040)) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") set_robust_list(&(0x7f0000000180), 0x18) 23:14:38 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000880)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?x\xa3\x9dj\xe3(\xf3\xc44\x93\xe8\xbf\xe1\xffE\x8a\xe5\xcd\x97\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xda9\xf3^ZP\x99\x10\x86x\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18Mo\xbbw)6l\x17\xbc3\xd7e\xe9\xbcY\x90\xa7\a\xf3\xa9\xc1\xf6\x06\x00\x00\x00\x00\xfa1\xd2\xc0\xa7u$\"\x00\x00\xe0b\xd1\r$\xde\xd5@i\x18\xa6k\x00\b\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xeca\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xd3\xaf7\x94PX\x83\x9e\x81\"`\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xbd\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\b\x00\x00\x00\xfb\xf3\xec\x00u\xbd\x88e\xb9j\x90\xbd\xe8\xfdMb\x98\xefod9KO\x8fm\x82?\b\x87#\xd2\x9f\xc2\xfc\r\x8e\x96\xf0\x1b&\a\xf9\n\x80\x83\xd8\xceq\x9d\x91i\x8f\xd6h\xdcT\xdf\x8a\xcb\xa8\xd9\xaf:W#?\x17\xa7\v\xa3\xd1\xeb\xb3\x11%\xe5\xaa\xc0\x89M\a6o\xe3EE@y\x12\xd8\x9a\xceP1\x80\xa7\xbb\x88\x95^\ru\xd2\x017MbM', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x7) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) fcntl$notify(r2, 0x402, 0x80000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = socket(0x10, 0x80002, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000080)) r7 = fcntl$dupfd(r4, 0x0, r3) r8 = signalfd4(r7, &(0x7f00000000c0)={0x8}, 0x8, 0x80000) fcntl$F_SET_FILE_RW_HINT(r8, 0x40e, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) signalfd4(r4, &(0x7f0000000040)={0x3}, 0x8, 0x80000) fcntl$notify(r0, 0x402, 0x1ffffffec) [ 173.977890] SELinux: ebitmap: truncated map [ 173.992995] SELinux: failed to load policy 23:14:38 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x10100d, 0x0) r1 = memfd_create(&(0x7f0000000040)='/dev/dsp\x00', 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r3, 0xffffffffffff7fff, 0x54cf}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={r4, 0x9}, 0x8) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRES64=0x0], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) 23:14:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x80000001, 0x101000) getsockname$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f00000002c0)=0x10) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x202000) ioctl$sock_x25_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@remote={[], 0x2}, 0xa, 'veth1_to_hsr\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x8000001ff) [ 174.317982] audit: type=1804 audit(1569021278.375:51): pid=7740 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir303319542/syzkaller.OPYTYs/23/bus" dev="sda1" ino=16714 res=1 23:14:40 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:40 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@mmap='mmap'}, {@posixacl='posixacl'}, {@noextend='noextend'}, {@privport='privport'}, {@version_9p2000='version=9p2000'}, {@privport='privport'}]}}) 23:14:40 executing program 1: timer_create(0x7, &(0x7f00000001c0)={0x0, 0x30, 0x4, @thr={&(0x7f0000000000)="3a7de7db38d039c3ed9822bbc9222aa224f8260973f3ee20ae409bb73df2f1363d8deb4f7222e22011c8287551e4c918d7f2bb5216e3691ed3670aa8a75b4c40a8a6137d8f7e0f40a43036c7ee411354994131d624afde57947fe73e123052e8e466dd6f7a23c8edccbf828be17a370d23148d0ce62d864a3b9879d3fa7f4e3b745ef0852f922f9ff2843c6f59b351816441", &(0x7f00000000c0)="93060e08e366b645c25cfedd917bc6d1ccc956a0f3f3ca50cc3d342a4ab89a78663516bcf726444b26285c066130dfd6c6202504b612fe0ead4e1ce6c1e8a92ddced615d526841b672f1de016110ab17efad8ab1142599ccc8362cc24ebccbdeebe1f530fdedd63929d0158f8ffb2a4c13ece1660a99a97a834af86996df96569792bb2a9cf8d5dfd926954b5b6912bc52bc2ad79925772f2d3e58d06d78b4074296da182afe8d8807e5bd22b9d101f153eff6e18d10d43decae35f895e0562b61560a986402e23af994eff6c6152d985eb657d3a05f05684c3c8f5992f2a9eda3438cf5d52feaaf2a6c"}}, &(0x7f0000000200)) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000500)="fc0000001d00071bab09250009000700020800034000000006007e93210001c000000000000000000000810000039815fa2c1ec28656aaa79bb94b46fe0000000a00020006046c6cf733e93dad19256f1a272fdf0d11512fd202ade01720d3f8bbc91a3e2e80c8fc05defd5a32e280fc83ab82f605f70cec18444ef92e475ef8a29d81f3d9a48a170e5bba4a463ae4f5566f91cf190201ded815b2ccd243fa95ed94e0ad91bd0734babc7c6d27392ad23f2eeb57d47689cd3dd16b17e583df150c3b8803000000a17c732229d655870271777a2758a80000c88068a130dddef3809000ffff0000deac270e33429fd31101f5e6c531a4eaf6a2fd6f5e", 0xfc) 23:14:40 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x7, 0xfffffffffffffbec, 0x9, 0x7, 0x9}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 23:14:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/wireless\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x40000000) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f00000000c0)={r6, 0x7}, 0x8) 23:14:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fchdir(r1) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="e118e8c1f216e6095160d003040000aa3b580deac16cfa297cb1b6f7a0b821e970728d015c9c447df45ed2f6146d19f9406c749250d4d05d3298d182fcfb233ce8d65782e7e1e18319bf5b297b8dee2a926203d0a4bad40e81cec2a3164ccdd9e45d38a524e0849214519fbac6b839e6b878392404fe43765fcef570befd667908f34d9995ccf5e14aaf168975698594e2f7a2809897c4dbd7ad086f47392c0750797aeb5e435aeed10951475c3be76a4ff39ad483d4897fd5a1998811bd9cf0321d5de211959ebfb34834aba950640000000000000000b0727d658ce8b7c14da70c3eec271c9d60c41e5ce1895a", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={r5, 0xe6}, &(0x7f0000000180)=0x8) 23:14:41 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000001080)=""/246) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x1b7}, 0x0, 0x0) acct(&(0x7f0000000080)='./file0\x00') vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 176.908211] audit: type=1326 audit(1569021280.965:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7779 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c84a code=0x0 23:14:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5457, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x3, 0x2) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000200)={0x0, {r2, r3+10000000}, 0x0, 0x4}) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$TIOCSSERIAL(r5, 0x541f, &(0x7f0000000100)={0x12c9, 0xc03, 0x10000, 0x401, 0x22, 0x6, 0x81, 0x3, 0x8, 0x6, 0x3, 0x2, 0xb12, 0x8, &(0x7f0000000000)=""/149, 0x200, 0x20, 0x9dfe}) [ 177.696516] audit: type=1326 audit(1569021281.755:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7779 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c84a code=0x0 23:14:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x7, 0x1be1d0da}, 0xc) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="380000001000010400"/20, @ANYRES32=r2, @ANYBLOB="515b0016001400010010000200000000239c00"/38], 0x38}}, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x200303) write$selinux_attr(r3, &(0x7f0000000080)='system_u:object_r:dhcpc_exec_t:s0\x00', 0x22) 23:14:41 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x5, 0x44831, r2, 0x4) mremap(&(0x7f0000547000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000000040)=""/229, &(0x7f0000000140)=0xe5) [ 177.815366] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 23:14:41 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000180)=@sr0='/dev/sr0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='aio\x00', 0x800, 0x0) [ 177.865618] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 23:14:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) r3 = accept$nfc_llcp(r2, &(0x7f0000000080), &(0x7f0000000100)=0x60) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) open(&(0x7f0000000180)='./bus\x00', 0x20000, 0x4) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3c, &(0x7f0000000040)=r4, 0xfffffffffffffce3) write$cgroup_subtree(r4, &(0x7f0000000200)={[{0x2b, 'pids'}, {0x2d, 'io'}, {0x2b, 'memory'}, {0x2b, 'io'}, {0x2b, 'pids'}, {0x46da99f4abb632cb, 'cpu'}, {0x2d, 'io'}]}, 0x25) [ 178.031033] audit: type=1804 audit(1569021282.095:54): pid=7837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir754813719/syzkaller.azsqQu/33/bus" dev="sda1" ino=16705 res=1 [ 178.072736] audit: type=1804 audit(1569021282.135:55): pid=7837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir754813719/syzkaller.azsqQu/33/bus" dev="sda1" ino=16705 res=1 [ 178.113741] audit: type=1804 audit(1569021282.175:56): pid=7842 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir754813719/syzkaller.azsqQu/33/bus" dev="sda1" ino=16705 res=1 [ 178.157327] audit: type=1804 audit(1569021282.175:57): pid=7842 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir754813719/syzkaller.azsqQu/33/bus" dev="sda1" ino=16705 res=1 23:14:43 executing program 4: socketpair$unix(0x1, 0x200000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x712}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x80000000000030a) dup3(r0, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 23:14:43 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x8) keyctl$session_to_parent(0x12) listen(r0, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, 0x0) 23:14:43 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7368f9ffffffffffffff77696e060000004241e78783f395cdea5ef506189eb9c37e9b39ca193b586d3d12d74537febc7e81e5473de838cb19113b1406ceb75c244863c4bd62f0850fcb1fdb56c7376e38"]) 23:14:43 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x8000, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5, 0x400, 0x1, 0x1, 0x1, 0x81, 0x178}, 0x1c) exit_group(0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a9", 0x1, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', 0x0, 0x0, 0x0, r1) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getgid() fchown(r4, r3, r5) r6 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = getgid() fchown(r8, r7, r9) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x238080, 0x0) ioctl$TIOCLINUX6(r10, 0x541c, &(0x7f0000000280)={0x6, 0x9}) setgroups(0x2, &(0x7f0000000080)=[r9, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r11 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) ioctl$DRM_IOCTL_AGP_RELEASE(r13, 0x6431) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r15 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r16 = getgid() fchown(r15, r14, r16) setgroups(0x2, &(0x7f0000000080)=[r16, 0x0]) setgroups(0x400000000000033e, &(0x7f0000000240)=[r16]) setgid(r5) 23:14:43 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffff7f0000000008000000000000000900000000000000080000000000000000010000000000000300fe02000000000000000000000000000000000000000000000000000000000000000000000000060000000000000005000000000000005c7100000000000002060907000000000000000000000000000000800000000000000000000000000000000000000000458e000000000000ff03000000000000f7ffffffffffffff09ff3d0100000000000000000000000000000000000000000000000000ef6e1540a031c643491caf41000000000000000000070000000000000003000000000000000000000000000000050405ba0000000000000000000000000000000000000000000000000000000000000000000000007f000000000000000500000000000000ffff000000000000021505b90000000000000000000000000000000000000000000000000000000000000000000000007f000000000000000008000000000000000000000000006006030104000000000000000000000000000000000000000000000000000000000000400000000000090000000000000001"]) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x3ff, 0x6) write$evdev(r1, &(0x7f0000000180)=[{{0x0, 0x7530}}], 0x11e8) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000000)=0xfffffffffffffff8, 0x4) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000000c0)=""/126) 23:14:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000200)=""/88) sendfile(r1, r2, 0x0, 0x80001d00c0d0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000001dad0fe118214ec78f42c8294e0a005abbf54c131e337f38a8cb010024000000000000000c000000bab949f6b0a6e4b886f0d6d9977781819bca175689674b35d7e05ae36929f42228e5f876e3f48d3d7b55c33965988dea8a7411b23c3b0378d16a2bd3bebf2b9ee99e14908f1c53e0ac33b31de5da7a7bb6ce05a9320f61024bd20cac4051b9634f0c670491ab2852fd0a2f583df180496ca6d336fc052e96ae3b8544104de2320bb15c9460d022", @ANYRES32, @ANYRESHEX=r1], 0x3}}, 0x4008805) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) r4 = dup(r0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x10000, 0x0) r5 = memfd_create(0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x644081, 0x0) ioctl$EVIOCSABS0(r6, 0x401845c0, &(0x7f00000001c0)={0x29, 0x8043, 0x1, 0x8, 0x5, 0x7f}) pwritev(r5, &(0x7f0000000340), 0x0, 0x81805) r7 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x10000, 0x0) ioctl$RTC_AIE_OFF(r7, 0x7002) ioctl(r5, 0x69b, &(0x7f0000000140)="841505630446") ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r4}) [ 179.949802] FAT-fs (loop2): Unrecognized mount option "shùÿÿÿÿÿÿÿwin" or missing value [ 180.071864] FAT-fs (loop2): Unrecognized mount option "shùÿÿÿÿÿÿÿwin" or missing value 23:14:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000480)={{0x5, 0x5, 0x1f, 0x2, '\x00', 0x9}, 0x4, 0x10, 0x2, r1, 0x1, 0x200, 'syz0\x00', &(0x7f00000000c0)=['}cgroup,\x00'], 0x9, [], [0x6, 0x0, 0x5, 0x2]}) writev(r0, &(0x7f0000000840)=[{&(0x7f0000000240)='j', 0x1}], 0x1) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)=""/255, 0xff}], 0x1}, 0x10102) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2000, 0x0) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f0000000140)=0xe93, 0x4) connect(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) 23:14:44 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) shutdown(r0, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000040)={0x3, 0x0, 0x2021, 0x5, 0x174, {0x8, 0x800}}) 23:14:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000540)=""/125) 23:14:44 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/bnep\x00') ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x79, 0x3, 0x5, 0x2}, {0x800, 0x7fff, 0x7, 0x7}, {0x40, 0x5, 0x5, 0x6}, {0x6, 0x5, 0x3, 0x400}, {0x5, 0x1453aee1, 0x2, 0x10000}, {0x8, 0x1ff, 0x8, 0x3}, {0x3, 0x0, 0xffffffffffffff05, 0xa3c0}, {0x400, 0x6, 0x3, 0x9}]}) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) utimensat(r3, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000180)=[{r1}], 0x1, &(0x7f0000000240)={r4, r5+10000000}, 0x0, 0x258) 23:14:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000200)=""/88) sendfile(r1, r2, 0x0, 0x80001d00c0d0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000001dad0fe118214ec78f42c8294e0a005abbf54c131e337f38a8cb010024000000000000000c000000bab949f6b0a6e4b886f0d6d9977781819bca175689674b35d7e05ae36929f42228e5f876e3f48d3d7b55c33965988dea8a7411b23c3b0378d16a2bd3bebf2b9ee99e14908f1c53e0ac33b31de5da7a7bb6ce05a9320f61024bd20cac4051b9634f0c670491ab2852fd0a2f583df180496ca6d336fc052e96ae3b8544104de2320bb15c9460d022", @ANYRES32, @ANYRESHEX=r1], 0x3}}, 0x4008805) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) r4 = dup(r0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x10000, 0x0) r5 = memfd_create(0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x644081, 0x0) ioctl$EVIOCSABS0(r6, 0x401845c0, &(0x7f00000001c0)={0x29, 0x8043, 0x1, 0x8, 0x5, 0x7f}) pwritev(r5, &(0x7f0000000340), 0x0, 0x81805) r7 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x10000, 0x0) ioctl$RTC_AIE_OFF(r7, 0x7002) ioctl(r5, 0x69b, &(0x7f0000000140)="841505630446") ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r4}) 23:14:44 executing program 2: syz_open_dev$sg(&(0x7f0000000300), 0x0, 0xf6d7be78e5dd73f6) r0 = socket$key(0xf, 0x3, 0x2) connect(r0, &(0x7f0000000080)=@xdp={0x2c, 0x1, 0x0, 0x8}, 0x80) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) write(r1, &(0x7f0000000340)="fc00000048000400ab0925ee030007000a060000000001000000000000003bd0d901006c92778411419da79bb94b46fe000000bc", 0x34) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, &(0x7f0000002500)="bfee60f29f431fa52c0a35cc14a7a2e7ec982d73241de0b9a99d58d5271e97ae632bcc61729a12deffeabb0873ed9f47cb7c8d3ae336c60c4468958d81f30ef83b24103448d8ca177f10c016c4a58a67429860ef9f50950cdaa88c1cc9edb7a449cfa7b94445bf9ada19dc461ad4090eaa59c277f134741a2c3b5ff1833126f52a467085e20998ad9a984ea87994b933792eb0c82822f6e75f2c2d1e30464556589737fd47cb1c69df367127a42bd8b97f595071d8dbb3ee20d14467c4e553c1724865bdaf7910a19e7f9ee200ef6fabd7c8b6f370ae0150d07398a83cefe6055f2d95227c6105430ba556a7d1d83fe8fbec8635e719a74b366a8db41db2d79aa50ee0cfa8a2779df95bda555ed45d793d0b36b30d14df3c64765be5498fae156e9536c181e4a196d5fb45627f3b28fa2d87f54ce265cbe835d0881df6d0ab58a839310c9cc0274b48c1f3fb70122af874f51aabdf9ab65fa67f436e595e9120786827daa6ed18d58891620f0fbc21b3c1e53459f54e471fdef136aef38ad0bbd4fee6a5a03376c88630d17ce529e259455f18b6abe54afb1994da17731e2c04db90566a89784e3d08783afa6fd77cfaf713efd9d56726a7d16eaa5307af39c083623c0c7d8e6d4b04ea79515d4a3e37491f4f0ab5e4a7198e26f0e488701282dc0cecec72c1854dc5b31dbc89b7c88480be40e6f67b9679220945bed7c2894b72778be164de284a29c9e363eaba03eb17065cf899191e054ed4db419953c938654e127f45a8a7a24dc2061fdfe69c257c96da9fd0fa70fdcdbf77419b9c43afaafc4425e1ad30217b6c6cd117c676124684d496f7b56eed13207f3e60b002e9e6d5e8baeeff40e26adc4c5715fc467eb8a5dc4bf887a6c272e0668a2da66b84de8e47a7f3082c46099afaaa9b93d29c376238c9db6740bb301bbe526ff3211d7e5693618f75fdca0bd9aa9ebdfd866e9d3c80f6bb1f8428e5949504e7277bc5ca9fcd341f950101c0adb4c52810bee41a45da2d41f2a89a8664dcfc83833f687db9a432134d9142b2dcce6a7941a38bb18cd4140f69a9e47af3d14d03ce0e201cb8bc87b212e575af9330e9e9af7b08a4c3e864bd17cc481b6d30a8493e7c75347dc40c71aabbbc85ecb7dc3109ffa0011b41822d47f87815e66b420fc6ebfc5212b85700d53e7ba324674919da853e9c30322c3e89f9678c09218984ee601b2026537c396f536849ed75dd13bd2a3ff51d89f6cfce3ba558c6c196e7c411b414ef665d2f991d7bbeb743e6c656a1980cd4da290cbef0621792b7f07a47ec7ad6696ed48a03b2897c24172f659aec9613980173fb45d5a44a4e4804fd4f1dfed6c51627e3d3f40cb948a3a5c009da3dabfef8c28266b4dff2f65ca84ff9cb93e300ea7b60b8ba2fca58e1c12565dd85c895704f185e48abd68cf44288a5467e1b07f65e8c5da6b15db4ed41247fc905340b9291efd9b9b6e359e73799236ffe6be0cf66f22a62d13394be8ef28875c594838779f019c34ae375d13f4c438cdbaced07b443b394be2c32a2f5fad74b6cba93f8aed3974e6084e8e23e0ba225f7b52712960a66d322306f6c0c4487da78227c1fed955775a13c242f0f31dcf68f8d079cce9e767089685ee6a07c84e98e4bef8f3757a097ea3b36f9de8209064c9550f9bbd73de06cce8363ceb6f05932ffaa00668af8f0c6a9fb6377df6883d26bfc53f0723b27408096a65d0043cdd6a4b2100fae899666ed20d3d14c2b8db8cbf2a5ebcaafadbe7aeda1f83c219503f61bcac5e2a173eb4b89ab51b546835bdb5cf600c515295385802bb13f0e13e4bb9cfeb27d11868c46f3b9d468a04593a4013fb126f0da7a64981f0f4858088a44450d11589bc4e9360f91411232f1f37f39b69bc7825b7527b2e04a80f0ce3d678102161eed980fb1fe80a5c309f86725761babc1b80cfef3b5d1ccee86abcabb9e8ccfaed7afee8f6117b54ac0fd0ef6e68991975114fa8df3016018307cf7aacf8aca1597ef866fd3a1f56768803ca003478f0d961c3a0fa27f12b80848a27dc77d3845d0a56c75f00de8bc170c7a59522639d6dd603ab31fd9763509a779f0f4f222beaee08006422d8d2111f8e2c50a0f40a8cb05541e30069928edc49a8da51cb2aabb11c45131dd1b40289b6b6d65f054c9952af00f62b811eba1dc97f4dccff2469bb973a2cd8429005d0ceaa9d2c3e185721e3fd5ea987add42ddf0919dc4c217dbd0cc71c1406e0814ebeb8a2ec06ec913ca8f4117d1b6a7efb7b988f089cff90f2e31021bf468f0c66fea455edf8e73c49ef6c49e3fa4248d0e2d72b7080a847b6ff058dbec6bef5e8516aa8a047efa10a8e3834ef00a3ec08592927d5f7aaa5b9bf7705f324ea3a40b28e5b283ce7eaa551bb912c89ccdb2d43acf99b21a275cf6a022f1e18ab5de00fdca905e889f18f2d5dce2fc516f97902ef77940bc914b7e9d5fe32e0a522c9835808dc291992f3748dfece3a9110aa043d2544267e03fb6408a170f89a22e3a5aea8661f3f08b27e048b400940b9a5b9b156ecb7a4cba5bd4ec72da97796f74489348cc422d6edb3a0a492a846dce33b09cbae1726b1bd80b60a8bce4a56bfba9e337888f72c59a4aba12ba7c8f9e18e10754f4a20f3cfe1518ec6986fd2b4b93157ff04ee42263b4b12ecd347603ab2a8643105da0f951e5e97d73a7456a20b32eb2682ffb5ef5d38877ea34c3f8e8c95cb89c5d1abef9def3148f023c2fb305cc481926fc05d1c2aa50aab33f71e272a9e7c8a1bb17b9071939b78ca5c519f9b1eb4474d3335aea55f4becf1161a9bb9c565f0c5f4f078137f39847116da58614800ad80da5450c916043473acf2343040b58d82888b6a71b81e24a119146414719e44ffdfc79c5e2092ac891ebd0b72168bfa6c395f79dd0559cbdac1814b5ed3ca7a158adf40ff3c6e910a120e8643c856b8bf10deee17c37d64c9665b1f9bbacfa893d706ff73c6742e4d26a05894e00ea334b8489eb7c972dfaa52b098647f7a8bd383a2c0e78d0fd5428dac2406fe57137ea9e9506823658cd9183ed54fc4a2496cfbe3926cf81f750ea235bb250f374800acb2b6795c9e5f349aee372f81c266570e44d3af6c4cb37f1f4e83cf5551712362b37d4de9eb89a7aae5c27d189763c665a0d7da558dedc19b3f28bb1baf5c9ef4224b2c5425fad2e96775346a0d55a1d07328acf27fdd6079700370474fab534a99db56cc4afe7eb46f709f587dad6837ea36fb9e41daffce6cc16dafa330cabf39d9cb7c493e0a791e89a4780f05ebfb56bd37fcda60c543c460b2e2ef838edd64b53f222d03b3c3a5569f2ff1605ba2956cece5fe0e85636a9834efd13dbc9f3b0fa0f4cf1e5120cc4f010b0f3dbbe7264d2a07c2c399500c61ef41271f577930e1980536876c49c2255893c289fa5c5d89f4facbac59cc5338a0edebc8fb1a8ca9acf8b669dbce6cc3fead982e746a416e5794f4575916190eac6ecbf35a26efa66275f4bc9623d87fdbbe6a4fc349adfe803abd32e9e25d9e36ae1e71636b83ff6fb180023473a67213e1ae9f028e516ac29b07723a61660d40be2fdef1816e6259f5f293a05bb9ccc7f1d9bf7bb056c47051677ee59cdb8a1f0be2995ed3c85bda87171c27515e07e011f6f073f06def3907593a441504d85f1a78c4fadc637a2c71714b87af9c25b8c390606de32e3dcb436690b0b607e5a754ad73f8e71d0724fb0a9f27a9d78f19c334d11d843b993033a1483d0e2c3e659cf57b771b61035273c3ad851a9b5b45b9cb4c9a36ba201df6a630a97ac015fdbf4c719ad94a755d726f9512b4ebfef360967faff21a0070111703807c1701b3fd40dcd6bcf90927da74aeba19be7d7e26fa9f76fce7c723624b473a4247ef6e32d1d8e9bcaa0621e5b7964b18b7ad62d8f77b6d470de0f78f269eb46a2ecb815b29bf3bc544dab760fa4c0d2898858f031476dd36651dde96b971b2eedf79221972fd222f2da4ae6beb0f29db5f5892b66fb90f0faba2b15874e8a7668a19138f6e85e4963b8a336f023c13bb9a39325c601aa57df5107c9c5ee1c4f7a31c7cf86ee3aaf7be84fa0631d5451026973e24f205abd31e08a566c60a5d947b352ecd03ff90576df7057971abb15b97d0a66492d166ddc8a8f02ce498e1598b5e4e253d5a2a0eebf9523afa69f44ed16f45ef2f98242036275b4b80e4f88d5d10eed4ae531edb01baf53f2f68245ccb280cb33b0cc40cfa1300faae1dfeb67badbea5364218b7ee7fdc69f9b7810c77a07330bccc353746aef0fd920162ae51689b4ea1f295f9f0aae9bdf8f25d213e1d6929899e198d33ac7fbbc85362163744f44b067e9dccecc793d3535f959b5ebb379c593646c02daddf6b9ed4e177698606b127d324830f1b54416aa96c4de8adfab22e711446010e253ad13c9d89b8daf7523b51ac13e05f066f3fff3d7ec46b1e46b7da9401cc2ee66185176220aa459320be40e9743ef89fcc72fd5bbb9c6b4715bd77fffe36970e5eb3b5c0b623e6fbef399dadca47f52a71786c388d7f3411de95ab3d484cb73cb8cbbb1ffc3478b3e363187f31375b2265eaa89ec00c66e423a5bbd74a6431fe96776c76509b20b4f23ea21825105c96d4a823389a11c15789f1d088d2e80c66829a93325122755fbfb257957fac94115082a4b64ead54c921ce41f4affa60cbf0b1897e7422e20ab9f6604b12966b86f46a726d1093a56bfeea7d7b85941029ef1a9d91ed7accee097542e2f0d64f9396f1e9fda914dc6efe2c852a226406aa8ad01f138b1969f924716a465910c86f2f86ee65261f37ee1bd908980121bee5cfe0e2ee0cf7f6848143da09c1b66a8ac160aee2b1894d0c02d9bd509526e04104b52a53e5c4bfeaa5aba21e3b887a06108ad7716aef56335b39df1ba2dac49179534d53dba9fc2c70b24092ebcd46cd7e9e10db4693629da5f91efb9d49ecc1f860484d1a052b33f8133613454179bb604228b80e31419557c3957fd0de00897b6d897cb3f85ff694d41bef64cc3a3760ec9ee203c068548f57d687dba707ef92458b22035f8c297784dd2cf66aef9ffb68e5d639ac2fa545c6ba6d4535976625026928e8be525aa240f3255a05707a2396ab9a199dedfdaad5aa7a299fc73d259854885f01b01b00f0b28f1add5db4937d3d4051a8828372b28af779f590742772e9049c7b1372e48a66d574c8c582492f867e3cc82f82edc78aaa277f85c6299652265c47800e23e5fe405fb07b21bbbe11783c83cf721926bff81f49bda4d75d18512a35e6b86ebcd5e2fbf1e133c17890bc2846b832e45b56526f0aa3a84295f041859c26935bf6d2932a85d9a944e5cbf3e9754c40e170133449dc4fc86f2612dedbe52c60cee5716fc7d5f881f1e7a616fbe81a3e8c3001642c1c08f3032bfc8b168c744bc797d717bf26c96dca4ae44b2e7a43afcf336c27813869861757df36716a5111d3e7deef7d91cc7c0e583b034aaa15dc5c72c9c60d667bf304b6c90ccc8efd9da00267d42b1a26cdb127bfda5e9325a3dad1e942e562797ba94e762cfba16333b33c89d30d9d8de57c84eea9dff99841d7026d6205fc7994f2a4acd6b173e909b6390820ba8b7077031cc80393fb4b38a68e2ab90020b4565af601dad1ac81a67ce3e3737d0918e7b8ed3bb5b24e606223f2817754e714bae7b114b4569db41ecb3976ce552808c9957518f188b1cad298396d195777ba0ad6ee6e7f49a1c8996ff1fc938e4eccb3d2604346977dce32288f947b3ca1158", 0x2000, 0x5, 0x0) 23:14:44 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x8000, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5, 0x400, 0x1, 0x1, 0x1, 0x81, 0x178}, 0x1c) exit_group(0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a9", 0x1, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', 0x0, 0x0, 0x0, r1) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getgid() fchown(r4, r3, r5) r6 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = getgid() fchown(r8, r7, r9) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x238080, 0x0) ioctl$TIOCLINUX6(r10, 0x541c, &(0x7f0000000280)={0x6, 0x9}) setgroups(0x2, &(0x7f0000000080)=[r9, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r11 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) ioctl$DRM_IOCTL_AGP_RELEASE(r13, 0x6431) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r15 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r16 = getgid() fchown(r15, r14, r16) setgroups(0x2, &(0x7f0000000080)=[r16, 0x0]) setgroups(0x400000000000033e, &(0x7f0000000240)=[r16]) setgid(r5) 23:14:44 executing program 2: syz_open_dev$sg(&(0x7f0000000300), 0x0, 0xf6d7be78e5dd73f6) r0 = socket$key(0xf, 0x3, 0x2) connect(r0, &(0x7f0000000080)=@xdp={0x2c, 0x1, 0x0, 0x8}, 0x80) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) write(r1, &(0x7f0000000340)="fc00000048000400ab0925ee030007000a060000000001000000000000003bd0d901006c92778411419da79bb94b46fe000000bc", 0x34) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, &(0x7f0000002500)="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", 0x2000, 0x5, 0x0) 23:14:47 executing program 2: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = open$dir(&(0x7f00000012c0)='./file1\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x800, 0x0) close(r1) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000080)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x4) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x869571eac309489b, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000180)={0x4, 0xd0f, 0xbbf4, 'queue1\x00', 0x23}) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000000)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000000100)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) r6 = dup(r0) r7 = dup2(r0, r6) mknodat(r7, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) 23:14:47 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:47 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) accept4(r1, 0x0, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r3 = socket$unix(0x1, 0x5, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000100)=""/79, &(0x7f0000000040)=0x4f) r6 = socket$unix(0x1, 0x5, 0x0) connect(r6, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r3, @ANYRES64=r6], 0x1c}, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x20000) ioctl$RTC_WIE_ON(r7, 0x700f) close(r3) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x200004) sendfile(r8, r9, 0x0, 0x80001d00c0d0) sendmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRES16=r8, @ANYRES32=r1, @ANYRES64=r2], 0xe}, 0x0) close(r0) 23:14:47 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x8000400) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) setsockopt$inet_int(r1, 0x0, 0x1e, &(0x7f00000000c0)=0x4e, 0x4) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000240), 0x8) sendmsg(r2, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000880)='#', 0x1}], 0x1, 0x0, 0x0, 0x3c01}, 0x802) 23:14:47 executing program 0: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x8000, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5, 0x400, 0x1, 0x1, 0x1, 0x81, 0x178}, 0x1c) exit_group(0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a9", 0x1, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', 0x0, 0x0, 0x0, r1) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getgid() fchown(r4, r3, r5) r6 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = getgid() fchown(r8, r7, r9) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x238080, 0x0) ioctl$TIOCLINUX6(r10, 0x541c, &(0x7f0000000280)={0x6, 0x9}) setgroups(0x2, &(0x7f0000000080)=[r9, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r11 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400004, 0x0) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r13, 0x200004) sendfile(r12, r13, 0x0, 0x80001d00c0d0) ioctl$DRM_IOCTL_AGP_RELEASE(r13, 0x6431) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000080)=0xe8) r15 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r16 = getgid() fchown(r15, r14, r16) setgroups(0x2, &(0x7f0000000080)=[r16, 0x0]) setgroups(0x400000000000033e, &(0x7f0000000240)=[r16]) setgid(r5) 23:14:47 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20200, 0x0) ioctl$KDDISABIO(r0, 0x4b37) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="2400000028001fff00"/20, @ANYRES32=r6, @ANYBLOB="000400000000000099ae70d8bb478a0a52be45ac165ef7e90000000035a6683f2fbbc0a6e5d57f9d91fd5329b0d9992e44c5cdb7b6065ec4dfaa8bd7e489b7985e5feb3873dd9dff11be0b57e7c6f5d493510a30006eb7a3d0ee5d538d0e0fbe3e4cb8d7a7888cca100f9bfd18eba991a8f85bd2229fe84a270e3d78c11d2f323abda3897f8bec2a83300029764d48d8b7bd13b5e70c6fbfe3565a719a071760"], 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast1, 0x31, r6}) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={0x0, 0x8, 0x56}, 0x8) 23:14:47 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0xffffffffffffffd3, 0x3526, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000000)) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) 23:14:47 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) dup(r2) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x60000007}) 23:14:47 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x40) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000040)={0x3, 0x1}) r1 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_buf(r1, 0x1, 0x23, 0x0, &(0x7f0000000180)) [ 183.137016] audit: type=1804 audit(1569021287.195:58): pid=7950 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir370924426/syzkaller.WJlpNt/35/bus" dev="sda1" ino=16762 res=1 [ 183.258424] audit: type=1800 audit(1569021287.225:59): pid=7950 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16762 res=0 23:14:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000840)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a40, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmsg$sock(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="742f398ea3bf32d52db6cd57c6b98d1ea935d64ec0b16f649981bcbabe3aeda7ed57d711bd5578e307c82866b502983aeaabb413443a22bf672394f8e23329173881dce124a0a820dba0ff85a95ae62bc902c7b9df2f16408cdf58e0b8a46de125b8e5b931b17b778ff3197e347a71e2e0b5e25c42e0653a372b4eb7127fac5121f61ae3d668898c2219ebbdfa989ab9112014005415650d77d386eb0a8776f6f1902afa7b06182864beea49317b0da5eec188728c05d51c2f900d66412b6d2a4fff560e1a9b3a4cb98cd1c9f0d7c0113cbc925b81126ae0737de202dba8d3fb45e56b4276a33b2a2367019cc0", 0xed}], 0x1}, 0x280000c0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) memfd_create(&(0x7f0000000140)='security-keyring@.\x00', 0x6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000ec0)=ANY=[@ANYBLOB='F', @ANYBLOB="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"/1117], 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000200)={0x960}) shutdown(r0, 0x1) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_OUTPUT(r6, 0xc004562f, &(0x7f0000000100)) ioctl$TCGETX(r6, 0x5432, &(0x7f0000000000)) 23:14:47 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000340)={0x8, 0x1}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000440)={0x54, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xffff}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) sched_setattr(r3, &(0x7f0000000500)={0x30, 0x3, 0x2, 0x4, 0x10000, 0xd5e, 0xffffffff, 0x8001}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:14:47 executing program 2: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)={0xecd, 0xaa5b}, 0x6) io_setup(0x2, &(0x7f0000000200)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x806, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x5000, 0x1000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) io_submit(r0, 0x8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0x65}]) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340), 0x0, 0x81805) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) r6 = dup2(r3, r4) accept$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) [ 183.284308] audit: type=1804 audit(1569021287.315:60): pid=7961 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir370924426/syzkaller.WJlpNt/35/bus" dev="sda1" ino=16762 res=1 [ 183.321360] audit: type=1800 audit(1569021287.315:61): pid=7961 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16762 res=0 23:14:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000000)={0x1, 0x1, 0x0, [{0xfffffffffffffffa, 0x10000, 0xfffffffffffffffa, 0x7, 0x1, 0x1ff, 0x6}]}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000009000000180004001400010062726f6164637f73742d6c696e6b00008a89a44dfa9da8792babfb08ac15192b5a26521d9a501df20909e2b64fdbbef07151fad64b40f361da2c0e4d2547432e15e23e0d8b6cf1de95c47906854aa3d4e86269f74aae72ff07003fefda81d97bdb24ba3a52bd596c381b0b2ea6e7e5b68757110d608ab8809ed032e3467fd51cd89a9a3d105b9e2a53f66f406489fb56a11dba0c229e9e86375c769e3ac86d3f12fad7e726785a9a2acb571be548f23a572ce56463df4b604b5c4732e2e7"], 0x2c}}, 0x0) [ 183.614789] IPVS: ftp: loaded support on port[0] = 21 [ 184.010991] IPVS: ftp: loaded support on port[0] = 21 23:14:50 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'syzkaller0\x00', 0x4d8a392}) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000031008106e45ae087185082cf0324b0eb20000000040000dd1e986afa21d9151cd8f286f9075b50001691", 0x2e}], 0x1}, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000100)={{0x7, 0xfff}, 'port1\x00', 0x40, 0x0, 0x4, 0x8, 0x7f, 0x6eb, 0x3, 0x0, 0xd, 0x72c}) 23:14:50 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)="cd", 0x1, 0x40000fc, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x800da0ffffffff], 0xffffffffffffffff}, 0x1000000000000002}, 0x1c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x52480, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x1) 23:14:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca52daa2216ca7bf070") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/rt_acct\x00') lseek(r2, 0x3, 0x1) 23:14:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x204000, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0x40045730, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x101000, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r2 = getegid() getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x92822, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@fscache='fscache'}, {@posixacl='posixacl'}, {@cache_none='cache=none'}, {@version_u='version=9p2000.u'}, {@msize={'msize', 0x3d, 0x7fffffff}}, {@loose='loose'}, {@cache_none='cache=none'}], [{@fsname={'fsname', 0x3d, '.*'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@subj_type={'subj_type', 0x3d, '/dev/snd/midiC#D#\x00'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0xd53a6b31cc274a6f, 0x63, 0x33, 0x39, 0x33, 0x6b14b15a7a5d88fd, 0x32], 0x2d, [0x51, 0x61, 0x31, 0x62], 0x2d, [0x36, 0x64, 0x32, 0x33], 0x2d, [0xed, 0x6a, 0xc], 0x2d, [0x36, 0x65, 0x36, 0x65, 0x33, 0x38, 0x62, 0x87251707c2f041bc]}}}]}}) 23:14:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000840)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a40, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmsg$sock(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="742f398ea3bf32d52db6cd57c6b98d1ea935d64ec0b16f649981bcbabe3aeda7ed57d711bd5578e307c82866b502983aeaabb413443a22bf672394f8e23329173881dce124a0a820dba0ff85a95ae62bc902c7b9df2f16408cdf58e0b8a46de125b8e5b931b17b778ff3197e347a71e2e0b5e25c42e0653a372b4eb7127fac5121f61ae3d668898c2219ebbdfa989ab9112014005415650d77d386eb0a8776f6f1902afa7b06182864beea49317b0da5eec188728c05d51c2f900d66412b6d2a4fff560e1a9b3a4cb98cd1c9f0d7c0113cbc925b81126ae0737de202dba8d3fb45e56b4276a33b2a2367019cc0", 0xed}], 0x1}, 0x280000c0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) memfd_create(&(0x7f0000000140)='security-keyring@.\x00', 0x6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000ec0)=ANY=[@ANYBLOB='F', @ANYBLOB="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"/1117], 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000200)={0x960}) shutdown(r0, 0x1) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_OUTPUT(r6, 0xc004562f, &(0x7f0000000100)) ioctl$TCGETX(r6, 0x5432, &(0x7f0000000000)) 23:14:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x3) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) setxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)=@random={'user.', 'sfb\x00'}, &(0x7f0000000140)='sfb\x00', 0x4, 0x2) [ 186.083235] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. 23:14:50 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) execveat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000100)='ppp0vboxnet0\x00', &(0x7f00000001c0)='systemsystemnodev$wlan0em1$cgroupwlan0,\x00', &(0x7f0000000280)='/dev/ptmx\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='userwlan1eth1selinux\x9cppp1\x00', &(0x7f0000000340)=']nodev/\x00', &(0x7f0000000380)='user[\x00', &(0x7f00000003c0)='/dev/ptmx\x00'], &(0x7f0000000600)=[&(0x7f0000000480)='*\\\x00', &(0x7f00000004c0)='+bdev\\\x00', &(0x7f0000000500)='ppp1\x00', &(0x7f0000000540)=',nodev\x00', &(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)='self%mime_type\x00'], 0x100) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket(0xa, 0x1, 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x22b) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000000)={0x7a}) [ 186.246142] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. 23:14:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000080)={0x0, r3}) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000040)={r8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={r8, 0x0, 0x20, 0x100000001}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000140)={r9, 0xb3, "722909ee25d7ce214d2a56ccc1f5bc20e480f814a617e6b35bc78ae286e955944a4671d6a885b40fa7ea12747199ef8e560c62aa536d6517e96fe4f351ea30aaf6911e2c26ec8fb658e979323247ed7835325a9821968e80f4251c6afc9cf3bb874341b0248fcd33b261bf2665f8201796ba7a96ec40282359d5e66a3e11f808c90aeb66db6d175b30f65f8149063831b8934d61e20a2f8cb403ede53db30d1f59bd9692e2dd2a773d037591b39abc4a5f37c9"}, &(0x7f0000000200)=0xbb) close(r4) 23:14:50 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x100000001}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:14:50 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001200)={0x0, @in6={{0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x10}, 0x4}}, 0x1, 0x7}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r1, 0x8, 0x8000}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0], 0x2) setsockopt$sock_int(r3, 0x1, 0x22, &(0x7f0000000200)=0x6, 0x156) recvmmsg(r3, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/117}, {&(0x7f0000000340)=""/127}, {&(0x7f0000000040)=""/32}, {&(0x7f00000003c0)=""/142}], 0x0, &(0x7f0000000480)=""/202}}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/189}, {&(0x7f0000000640)=""/247}, {&(0x7f0000000740)=""/203}, {&(0x7f0000000840)=""/95}, {&(0x7f00000008c0)=""/184}, {&(0x7f0000000980)=""/162}, {&(0x7f00000001c0)=""/63}, {&(0x7f0000000a40)=""/188}], 0x122, &(0x7f0000000b80)=""/226}}, {{&(0x7f0000000c80)=@sco, 0x0, &(0x7f0000001180)=[{&(0x7f0000000240)=""/52}, {&(0x7f0000000d00)=""/28}, {&(0x7f0000000d40)=""/231}, {&(0x7f0000000e40)=""/207}, {&(0x7f0000000f40)=""/87}, {&(0x7f0000000fc0)=""/2}, {&(0x7f0000001000)=""/214}, {&(0x7f0000001100)=""/78}], 0x0, &(0x7f0000004400)=""/247}}, {{&(0x7f0000001300)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x0, &(0x7f00000013c0)=[{&(0x7f0000001380)=""/30, 0xffffffffffffff12}], 0x0, &(0x7f0000001400)=""/88}}, {{&(0x7f0000001480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x0, &(0x7f0000001940)=[{&(0x7f0000001500)=""/80}, {&(0x7f0000001580)=""/195}, {&(0x7f0000001680)}, {&(0x7f00000016c0)=""/193}, {&(0x7f00000017c0)=""/31}, {&(0x7f0000001800)=""/108}, {&(0x7f0000001880)=""/56}, {&(0x7f00000018c0)=""/86}]}}, {{&(0x7f00000019c0)=@l2, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000001a40)=""/4096, 0xfffffee5}, {&(0x7f0000002a40)=""/253}, {&(0x7f0000002c00)=""/234}, {&(0x7f0000002d00)=""/182}, {&(0x7f0000002b40)=""/93}, {&(0x7f0000002dc0)=""/4096}]}}, {{&(0x7f0000003e40)=@alg, 0x0, &(0x7f00000041c0)=[{&(0x7f0000003ec0)=""/159}, {&(0x7f0000003f80)=""/1}, {&(0x7f0000003fc0)=""/255}, {&(0x7f00000040c0)=""/246}], 0x0, &(0x7f0000004200)=""/44}}], 0x15a3ac8, 0x0, 0x0) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000012c0), &(0x7f0000001680)) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000002bc0)={0x0, 0x0, 0x0}, &(0x7f0000004500)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000004540)={0x0, 0x0, 0x0}, &(0x7f0000004580)=0xc) setresgid(r4, r6, r7) [ 186.684733] IPVS: ftp: loaded support on port[0] = 21 23:14:53 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000340)=ANY=[@ANYBLOB="0100000000000000000000000100000d300000000000000000000000000000000000000000000000000000002780bf5423bd5ecb452de425b128c30500d4000000000000000000007a167250e792ffdd2ea25b8934375faac76d20506ee670f4b02eee41beaabdfc8deddb221fbe4ae86f00001b58fd733a279f56ddf724bffddce2e68d10b05c5939918905d37ea8086cbf47cb5829bc4ba0ee8d840ffd356104ead9f24886e3f246cf699217cd93a8802e6a9d0883bf58dd471958a350af48c1b9f6ceb747f3db641e2206c42b"]) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) recvfrom$llc(r2, &(0x7f0000000240)=""/234, 0xea, 0x40000105, &(0x7f0000000040)={0x1a, 0x3, 0x8, 0xced7, 0xfffffffffffeffff, 0x3f}, 0x10) 23:14:53 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000440)=0x5, 0x4) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000500)=ANY=[@ANYBLOB="6003000000005531a6c0befac9067f0f674eec375800", @ANYBLOB="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"], 0x9d}}, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000001680)=""/4096, &(0x7f0000000100)=0x1000) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfd874e4404b6f9, &(0x7f0000000140)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xfffffffffffffe01, 0x400}], 0x5, 0x0) 23:14:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r2, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f00000005c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="0100003f17dfba05227897205743e7b3e3346e9d2972b9a1aff939fb5230459d9302dd27bd21830d9b50d03658831b8a623d61113c1b41ad400146bbf392c4f884b016a41ae194e7e1a20d8682ad04e3aff3a949d7dab092e83794ef03b3fe60c190ba365bdbe385e212a6f1eae62699037b4d6a631ca52663f0a156fbbd3ce223609c149fee6e4277b443056f3b392b"], 0x8) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f00000001c0)={"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"}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0), 0xfffffffffffffe8c) 23:14:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000840)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a40, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmsg$sock(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="742f398ea3bf32d52db6cd57c6b98d1ea935d64ec0b16f649981bcbabe3aeda7ed57d711bd5578e307c82866b502983aeaabb413443a22bf672394f8e23329173881dce124a0a820dba0ff85a95ae62bc902c7b9df2f16408cdf58e0b8a46de125b8e5b931b17b778ff3197e347a71e2e0b5e25c42e0653a372b4eb7127fac5121f61ae3d668898c2219ebbdfa989ab9112014005415650d77d386eb0a8776f6f1902afa7b06182864beea49317b0da5eec188728c05d51c2f900d66412b6d2a4fff560e1a9b3a4cb98cd1c9f0d7c0113cbc925b81126ae0737de202dba8d3fb45e56b4276a33b2a2367019cc0", 0xed}], 0x1}, 0x280000c0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) memfd_create(&(0x7f0000000140)='security-keyring@.\x00', 0x6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000ec0)=ANY=[@ANYBLOB='F', @ANYBLOB="00000f9de0000001000000ffffffffffaaaaaaaaaabb0000000000000000000000000000000000000000ff00ffff0000000000000000000000000000000000000000000000000000001c000000000000ff00ffff00ff0000000000000000000010000009800080010081000976657468315f746f5f7465616d00000069726c616e300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000080000000000000000000000f0002001000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000da0300008100000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c6500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac1e0001e00000020f00000001000000ac14140aac1414aaff000000ffffff00000000000000000000000000000000000000000000000000ffffff00ffff0000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000900020000f65000077665746831000000000000000000000076657468315f746f5f6272696467650000000000000000000000ff0080000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000400100000000000000000000f00038010000000000000000000000000000000000000000000000000000480049444c4554494d4552000000000000000000000000000000000000000000ff03000073797a3000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800"/1117], 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000200)={0x960}) shutdown(r0, 0x1) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_OUTPUT(r6, 0xc004562f, &(0x7f0000000100)) ioctl$TCGETX(r6, 0x5432, &(0x7f0000000000)) 23:14:53 executing program 1: setreuid(0x0, 0xee00) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000240)={r0, r4, 0xfffffffffffffff8, 0x8e, &(0x7f0000000040)="c8e468bd5e7180db8ab66f107982674e1ce3e3d74103658dd23e5c0f0c68c103be4e15640bfb47f434fc254233307447e6b671870f4e91c432e5b93bc249d95cdede37ac8b7c443a5847ff03a78aeef67bcbecb930ee80313b18cd625f9a673ab9f5139fca398f2d121134255e37670388a468e436b23b251c0f2dd317c3f963186fd40d17e3ad9041070c3fbf24", 0x1, 0x9bc2, 0x1366, 0x7cd, 0x6, 0x1, 0x8, 'syz0\x00'}) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000140)='sq\"\"#\xa6\xf0(\x12\xac\xbfje\x96\x89% \x8ect\x01\x00\x00\x00\x00\x00\x00\x00_dev\x17p\xf2v\xc8\r\xdb\a3x\xfc\xbbL\xb0\x8d\x95\xc8Sf\xf2Sx\xf4X8\xfbYs\x84\x02.~\x0f\x1b+\xbd\xd5r\xbb\x80\xa0\xff\xd9\x8e\xe4f%\x83\x8e\xda\xb9\xf0\x91\x9fJ\x96W\x89\x9b\x0e4\x05\xaa[\xe2\xf6\xb0m\x86~%o\n\x82\x95\xf7\r\x8e\xb0\x81\x98/\xac?\xdc:\xba\x90\xbd\xc5b\xd6\xad\xd6\xdf\x9c\xda\xf8\xc4n\xf0L\x886\xd4\x89\xd8\x17\xec\xf4\xfa|< [t\xbb/E\x9a\x94o.\xb6\xeb`\x80I\xc9\'?[av\xce\xbd\xbe\x0fN~\x04G\x9e\xd5O\xe6\a\xe3(f\x7fKb\xb2\x11t\x1d\xa3\x04\x00\x00\x00v\xce\xbf\x8e\xf8\x8a\xe8\xf3\x9d-TC\x84eA\xe7\xe1a\xb8\xcf\xf3(9\xbdkX\xb7N\xc4\x8e\xb5\xa9\xf3us\x0e\xe380xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x14, &(0x7f0000000040)="ff55d36cffba04365d0000000000000101000000", 0x14) setsockopt$inet6_buf(r1, 0x29, 0x15, &(0x7f0000000000)="ff55d36cffba04365d0000000000000101000000", 0x14) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000140)="6f4ade81376352345b04dbfae5c8fb10b0c7d4b7113902f8c37f438dfbf0e2bdd9049fe488a66d38b6bdb278fc1c65c3acc40095ba47506d300544609d08539ffdea250702d093c888efd5c25ef6f78638fd38022847bf53d1d60f747b5abed932ccb7192c1a096efe186b8bfe4b6864686e09e98a78a181bc46c83d12994980f9e2932cc029d4be8a8cbff457634c20213635fd7fcaca297a2f792e8d2edb31fb4f5f2ef21089bcd7c63edb9bd2c2688875d91d8b4358dc763c258b4408e49e7a441eafb34b1d514ee917a10212b9c6adbf", 0xd2) 23:14:53 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 23:14:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, 0xffffffffffffffff) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="07000000000000009a0f00000000000000000000000000000500000000000000000100000000008000000000c3000000000000000035236586886842995438445b016235084a4c018cc1d5f6ca68c3f079403ab71700"/97]) [ 189.537496] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 189.565633] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 189.581847] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 189.605723] EXT4-fs error (device loop1): ext4_iget:4703: inode #2: comm syz-executor.1: root inode unallocated [ 189.624852] EXT4-fs (loop1): get root inode failed [ 189.629839] EXT4-fs (loop1): mount failed 23:14:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = accept$alg(r0, 0x0, 0x0) close(r2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0x1000000000000367, [{}, {}, {}, {}, {}]}, 0xffffff8f) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) r7 = accept4$bt_l2cap(r4, &(0x7f0000000180), &(0x7f00000001c0)=0xe, 0x180800) fcntl$dupfd(r2, 0x0, r7) ioctl$SIOCAX25DELUID(r4, 0x89e2, &(0x7f0000000040)={0x3, @null, r6}) 23:14:53 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 23:14:53 executing program 4: r0 = shmat(0x0, &(0x7f0000fef000/0x4000)=nil, 0x3000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6d, 0x200000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000040)={0x8001, 0x2, {0xffffffffffffffff, 0x1, 0x1, 0x2, 0x7fff}}) shmdt(r0) 23:14:53 executing program 1: r0 = getpgrp(0x0) getpgrp(0x0) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81805) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x38) ptrace$cont(0x18, r4, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0xe7, "c4593a595eb300b669408c2a200a8b4d839bee9b93f2e26b70ca29bf95b70498f89f3069ca35b2c9c62c35881a30f33e228be7637174a656a0730920e22c62a786e3967bab26781767d72a85a328b31cab93b99e4083e0b658a1d93d9c0ba4c8288ffe0e79fe12077a1e54e76e9e9d87e695830fc014399696b8c651314fb461061f63b19dcc9878ed376ae78564021e3cf27132a00f67cf19a3efe4ae6cbaae920fcb28d5bc6675542ab25329334601e9d7b563747974a9da1ebaddbfe1322e11f2ff0efe0ffa36cb1ead4c50d3792f0cb0cd1a1b0c0e4909b213325cda3992766cc8f837e333"}, &(0x7f0000000180)=0x10b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r4, 0x0, 0x0) kcmp(r0, r4, 0x5, r2, 0xffffffffffffffff) 23:14:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000840)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a40, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmsg$sock(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="742f398ea3bf32d52db6cd57c6b98d1ea935d64ec0b16f649981bcbabe3aeda7ed57d711bd5578e307c82866b502983aeaabb413443a22bf672394f8e23329173881dce124a0a820dba0ff85a95ae62bc902c7b9df2f16408cdf58e0b8a46de125b8e5b931b17b778ff3197e347a71e2e0b5e25c42e0653a372b4eb7127fac5121f61ae3d668898c2219ebbdfa989ab9112014005415650d77d386eb0a8776f6f1902afa7b06182864beea49317b0da5eec188728c05d51c2f900d66412b6d2a4fff560e1a9b3a4cb98cd1c9f0d7c0113cbc925b81126ae0737de202dba8d3fb45e56b4276a33b2a2367019cc0", 0xed}], 0x1}, 0x280000c0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) memfd_create(&(0x7f0000000140)='security-keyring@.\x00', 0x6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000ec0)=ANY=[@ANYBLOB='F', @ANYBLOB="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"/1117], 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000200)={0x960}) shutdown(r0, 0x1) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_OUTPUT(r6, 0xc004562f, &(0x7f0000000100)) ioctl$TCGETX(r6, 0x5432, &(0x7f0000000000)) 23:14:53 executing program 2: syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001280)='/proc/capi/capi20\x00', 0x0, 0x0) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000012c0), 0x4) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) ftruncate(r1, 0x200004) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) write$P9_RSYMLINK(r4, &(0x7f0000000100)={0x14, 0x11, 0x1, {0x4a, 0x1, 0x5}}, 0x14) sendfile(r0, r1, 0x0, 0x80001d00c0d0) ioctl$VIDIOC_QUERYMENU(r1, 0xc008561c, &(0x7f0000000040)={0x100000008000004, 0x0, @name="7b89031bf0e31f40007b63e8a4e20d45c9bfc9246ede1ebe533d58a0ec8ab32e"}) 23:14:54 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 23:14:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x5}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x41, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$nl_route(0x10, 0x3, 0x0) set_thread_area(&(0x7f0000000180)={0x7ff, 0x100000, 0x1000, 0x3, 0x80000001, 0x100000001, 0xd988, 0x2c5cb56b, 0x0, 0x7}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) dup(r2) 23:14:54 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:54 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000080)=0x0) ptrace$getenv(0x4201, r6, 0x80000000, &(0x7f0000000200)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r8 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4$packet(0xffffffffffffffff, &(0x7f0000005c00)={0x11, 0x0, 0x0}, &(0x7f0000005c40)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000005c80)={'veth0\x00', r9}) ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0) 23:14:54 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) [ 190.098795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.129726] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 23:14:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x5}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x41, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$nl_route(0x10, 0x3, 0x0) set_thread_area(&(0x7f0000000180)={0x7ff, 0x100000, 0x1000, 0x3, 0x80000001, 0x100000001, 0xd988, 0x2c5cb56b, 0x0, 0x7}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) dup(r2) [ 190.197351] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.225249] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 23:14:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa863f00000000000000fffe8002437f050dff28f50003000088ffff020000000000000000000db50000018600907800070e0060c5961e0000000001010000000000001803000000000000000001754e6eb4dc3e4fb5aa39526981a2"], 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) sched_rr_get_interval(r0, &(0x7f0000000080)) 23:14:54 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0xffffffce, 0x0, 0x1000, &(0x7f0000000140)={[{@errors_remount='errors=remount-ro'}], [{@obj_role={'obj_role', 0x3d, 'errors=\\emount-ro'}}, {@audit='audit'}, {@permit_directio='permit_directio'}]}) [ 190.374799] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 23:14:54 executing program 2: write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8, 0x40000) write$vnet(r1, &(0x7f0000000340)={0x1, {&(0x7f0000000100)=""/219, 0xdb, &(0x7f0000000200)=""/176, 0x1, 0x4}}, 0x68) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 190.457476] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 23:14:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000840)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a40, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmsg$sock(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="742f398ea3bf32d52db6cd57c6b98d1ea935d64ec0b16f649981bcbabe3aeda7ed57d711bd5578e307c82866b502983aeaabb413443a22bf672394f8e23329173881dce124a0a820dba0ff85a95ae62bc902c7b9df2f16408cdf58e0b8a46de125b8e5b931b17b778ff3197e347a71e2e0b5e25c42e0653a372b4eb7127fac5121f61ae3d668898c2219ebbdfa989ab9112014005415650d77d386eb0a8776f6f1902afa7b06182864beea49317b0da5eec188728c05d51c2f900d66412b6d2a4fff560e1a9b3a4cb98cd1c9f0d7c0113cbc925b81126ae0737de202dba8d3fb45e56b4276a33b2a2367019cc0", 0xed}], 0x1}, 0x280000c0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) memfd_create(&(0x7f0000000140)='security-keyring@.\x00', 0x6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000ec0)=ANY=[@ANYBLOB='F', @ANYBLOB="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"/1117], 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000200)={0x960}) shutdown(r0, 0x1) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_OUTPUT(r6, 0xc004562f, &(0x7f0000000100)) 23:14:54 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000080)=0x4) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, 0x0, &(0x7f0000000040)=0xffae) 23:14:54 executing program 3: r0 = gettid() clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:54 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'nlmon0\x00', {0x2, 0x4e24, @multicast2}}) getsockopt(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe8d) 23:14:54 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x3, @sliced={0x0, [0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a90]}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0585609, &(0x7f0000000300)={0x0, 0x2}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x62040, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20000000}}}) [ 190.801615] use of bytesused == 0 is deprecated and will be removed in the future, [ 190.815405] ptrace attach of "/root/syz-executor.3"[8190] was attempted by "/root/syz-executor.3"[8192] 23:14:54 executing program 3: r0 = gettid() clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:54 executing program 1: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) write$cgroup_subtree(r2, &(0x7f00000006c0)=ANY=[@ANYBLOB="241736bdd017de9483e7e0d6a9250f034e88b00cec7be7f6a538fb5961a285c435c733630f2f8a702333b0347e394f0ad4de1a61e0500ce06040b6e2042703c2901781540c68813334494d02ab47cbb4904ba828cc7b8a26e5937c270f1d2d3f69aebf8d9c6d594e9c569dfa1ae24bb36aaaf0bde2c982b98abce886df996fa50d8cd171757a40c9cc31620c746fbbe0e0fd45539768ba96d599a09ed037817efd7b409419b017c7c7477c1699646fa964a2321eaad8b7d1c18c93db0e3498f3bcfa8fc340ffdc8b4a31b77a2694d629266d8123387c1ff05845cff35217861bdaabc97957f8dce56c51313679d6"], 0xee) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80008, 0x0, 0x10000, 0x0, 0x0, 0x4, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x1f, 0x100, 0x10001, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x2734c79b, 0x0, 0x1, 0xffffffff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, r0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) [ 190.843540] use the actual size instead. 23:14:55 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x1}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) sendto$inet6(r2, &(0x7f0000000100)="c1d5f387b2f709ab79b67664857f36f92e339ffb1b2bdc2cebfac2b6f571ead5ed706f4a6d8929edc8932a3f3c2a70714dc8ccf348ec9679328feafc7e9745df2a1bcafb139b2faedf572190b19735cbf30d327423bb28da2a3102ebc39f5b095ede067b3bbbbc255d6cf8ba2773ed1a593fb4c175d23c4451bb1c8d39302d776cc74ffc52c904b254d9f0e6b97f40d10cae8e4f2a53fc698262056a7d3189d4e9eb61f0fcdd827c1676ded4fed358e98acf49ae2437e6d818fa92c2429bfe5962f8bf28341d74", 0xc7, 0x100, &(0x7f0000000000)={0xa, 0x4e20, 0x1ff, @loopback, 0x3}, 0x1c) [ 190.924908] ptrace attach of "/root/syz-executor.3"[8202] was attempted by "/root/syz-executor.3"[8203] 23:14:55 executing program 3: r0 = gettid() clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) [ 191.054796] ptrace attach of "/root/syz-executor.3"[8214] was attempted by "/root/syz-executor.3"[8216] 23:14:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 23:14:55 executing program 0: pipe(&(0x7f0000000400)={0xffffffffffffffff}) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff, 0xfffffffffffffffe}, r1, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) dup3(r0, r2, 0x0) [ 191.209143] ptrace attach of "/root/syz-executor.3"[8228] was attempted by "/root/syz-executor.3"[8231] [ 191.515165] IPVS: ftp: loaded support on port[0] = 21 23:14:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8020000) semget$private(0x0, 0x1, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) 23:14:57 executing program 1: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) write$cgroup_subtree(r2, &(0x7f00000006c0)=ANY=[@ANYBLOB="241736bdd017de9483e7e0d6a9250f034e88b00cec7be7f6a538fb5961a285c435c733630f2f8a702333b0347e394f0ad4de1a61e0500ce06040b6e2042703c2901781540c68813334494d02ab47cbb4904ba828cc7b8a26e5937c270f1d2d3f69aebf8d9c6d594e9c569dfa1ae24bb36aaaf0bde2c982b98abce886df996fa50d8cd171757a40c9cc31620c746fbbe0e0fd45539768ba96d599a09ed037817efd7b409419b017c7c7477c1699646fa964a2321eaad8b7d1c18c93db0e3498f3bcfa8fc340ffdc8b4a31b77a2694d629266d8123387c1ff05845cff35217861bdaabc97957f8dce56c51313679d6"], 0xee) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80008, 0x0, 0x10000, 0x0, 0x0, 0x4, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x1f, 0x100, 0x10001, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x2734c79b, 0x0, 0x1, 0xffffffff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, r0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) 23:14:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 23:14:57 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$binder(&(0x7f00000000c0)='//<\x06nder\x03\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00'}) 23:14:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000840)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a40, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmsg$sock(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="742f398ea3bf32d52db6cd57c6b98d1ea935d64ec0b16f649981bcbabe3aeda7ed57d711bd5578e307c82866b502983aeaabb413443a22bf672394f8e23329173881dce124a0a820dba0ff85a95ae62bc902c7b9df2f16408cdf58e0b8a46de125b8e5b931b17b778ff3197e347a71e2e0b5e25c42e0653a372b4eb7127fac5121f61ae3d668898c2219ebbdfa989ab9112014005415650d77d386eb0a8776f6f1902afa7b06182864beea49317b0da5eec188728c05d51c2f900d66412b6d2a4fff560e1a9b3a4cb98cd1c9f0d7c0113cbc925b81126ae0737de202dba8d3fb45e56b4276a33b2a2367019cc0", 0xed}], 0x1}, 0x280000c0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) memfd_create(&(0x7f0000000140)='security-keyring@.\x00', 0x6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000ec0)=ANY=[@ANYBLOB='F', @ANYBLOB="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"/1117], 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000200)={0x960}) shutdown(r0, 0x1) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_OUTPUT(r6, 0xc004562f, &(0x7f0000000100)) 23:14:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="050314000000000700cef987c3ba060d536d72463eb155075d1ee96eb8fa9787b2a4a559e252ba67358237411f454817b73598c82d54db7e3dd3b6501dd8b4d42c12c2abb7716b4006ca876153c1f3a44bfa0e9af03aceeba4217de838bac93f163fe9491facd6ce76528183f1e6690daee77ce047f35c48990974aa7fe5dc37d1e3ea763e1e8c1f0ba03c2ebe42447521ed88055dab325a5a4f519abff671841554760b7533d6f713b11072fd3c871a0a01a140813b7e480ebe3a7415dcf22236c4d8e3cfa1370b9176904ee3a6f06cf64a0b856a72da34"], 0xd8, 0x6f64c02c3097d90c) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x7) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0x400, 0x4) ftruncate(r1, 0x2081ff) [ 193.491280] ptrace attach of "/root/syz-executor.3"[8251] was attempted by "/root/syz-executor.3"[8254] 23:14:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 23:14:57 executing program 4: socketpair$unix(0x1, 0x801, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000002b00)={&(0x7f00000018c0)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0x0) 23:14:57 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f00000001c0)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x18, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xff}]}}}}}}}}, 0x0) [ 193.630752] ptrace attach of "/root/syz-executor.3"[8264] was attempted by "/root/syz-executor.3"[8268] 23:14:57 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) [ 193.675580] IPVS: ftp: loaded support on port[0] = 21 23:14:57 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000000280)=""/4096, 0x1000) 23:14:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) [ 193.696270] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 193.768382] ptrace attach of "/root/syz-executor.3"[8281] was attempted by "/root/syz-executor.3"[8284] [ 193.775050] syz-executor.2 (8274) used greatest stack depth: 23264 bytes left 23:14:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0xe, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) 23:14:57 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:57 executing program 2: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000011000000000200002f00"/26], 0x1a) 23:14:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000000)="f3410fc7b18df6000048b800000080000000000f23d00f21f835100000090f23f83e36f3416f35100000000f22e0c4e1d1f93766b8cb008ee8c4a18dc27874593ef30f0966ba410066ed48b800000000000000000f23c80f21f8350c0020000f23f8c744240000500000c7442402a8d70000c7442406000000000f011424", 0xffffffffffffffbf}], 0xdb, 0xd, 0x0, 0xfffffffffffffe11) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 193.933086] ptrace attach of "/root/syz-executor.3"[8296] was attempted by "/root/syz-executor.3"[8299] 23:14:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000840)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a40, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmsg$sock(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="742f398ea3bf32d52db6cd57c6b98d1ea935d64ec0b16f649981bcbabe3aeda7ed57d711bd5578e307c82866b502983aeaabb413443a22bf672394f8e23329173881dce124a0a820dba0ff85a95ae62bc902c7b9df2f16408cdf58e0b8a46de125b8e5b931b17b778ff3197e347a71e2e0b5e25c42e0653a372b4eb7127fac5121f61ae3d668898c2219ebbdfa989ab9112014005415650d77d386eb0a8776f6f1902afa7b06182864beea49317b0da5eec188728c05d51c2f900d66412b6d2a4fff560e1a9b3a4cb98cd1c9f0d7c0113cbc925b81126ae0737de202dba8d3fb45e56b4276a33b2a2367019cc0", 0xed}], 0x1}, 0x280000c0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) memfd_create(&(0x7f0000000140)='security-keyring@.\x00', 0x6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000ec0)=ANY=[@ANYBLOB='F', @ANYBLOB="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"/1117], 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000200)={0x960}) shutdown(r0, 0x1) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_OUTPUT(r6, 0xc004562f, &(0x7f0000000100)) [ 194.344760] audit: type=1804 audit(1569021298.395:63): pid=8312 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir303319542/syzkaller.OPYTYs/36/file0/file0" dev="loop0" ino=4 res=1 23:14:58 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="38f19c0434cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="c37c5e74bb4ce4100e71d9155eaf710b2be7b9bd75fe9711c59f7d9c21b47a61e8089f2ecebe8ae9ad7f608dc82ca9c92f7e4d538cf51c526f7735d9b8f0ee7c07fb01aa2d0f9fdbd2c8916e51d18075bf272146cb84aac95840c5477416d6bf083f135e7d6113e4daaddc227748a59dcfa4e1", @ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee45101ed000029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecad4c079521dfdaf3d8fef515583873ddd56ce404602b1894ef983d0cfcdfbb1118c5ae8c6b540b32a7db10396d42dcfb98a27a58ec1bcfc693000031f1e111beeb4dd6d7f5fdf7eeea78ad2efefc4cd8"], 0x0, 0x135}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:14:58 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) mkdir(0x0, 0x40) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) 23:14:58 executing program 1: r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815b", 0x3, 0xfffffffffffffffe) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x2, "a5716072fd5f8517a694f77d77d6f016ff9a592c309f8e517809f51c405fb9dd"}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 23:14:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000014c0), &(0x7f0000001500)=0x30) [ 194.386586] audit: type=1800 audit(1569021298.405:64): pid=8312 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4 res=0 23:14:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe7\x12\xff\xff\x00\x00\x00\x00\x00\x02\xdb\x19\x00', 0x1}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r0, r3, 0x0, 0x800000000024) 23:14:58 executing program 1: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.u'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) open(&(0x7f0000000080)='./file0\x00', 0x500, 0x0) [ 194.424060] audit: type=1804 audit(1569021298.405:65): pid=8314 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir303319542/syzkaller.OPYTYs/36/file0/file0" dev="loop0" ino=4 res=1 [ 194.479297] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 194.481642] ptrace attach of "/root/syz-executor.3"[8326] was attempted by "/root/syz-executor.3"[8331] 23:14:58 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:58 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x24d42ca6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bf, @time={0x77359400}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0xc0305302, &(0x7f0000000280)={{}, 'port1\x00'}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000015) [ 194.514165] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:14:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup2(r2, r1) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) close(0xffffffffffffffff) io_setup(0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 23:14:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") pipe(&(0x7f00000001c0)) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) listen(r0, 0x400000001ffffffd) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xf908, @mcast1, 0x7f}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x2e}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0xffffffffffffff01, @ipv4={[], [], @remote}, 0x7557}, r4}}, 0x30) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) [ 194.583793] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 194.609559] ptrace attach of "/root/syz-executor.0"[8345] was attempted by "/root/syz-executor.0"[8351] [ 194.664827] audit: type=1400 audit(1569021298.725:66): avc: denied { name_bind } for pid=8358 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 194.752900] audit: type=1400 audit(1569021298.755:67): avc: denied { node_bind } for pid=8358 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 194.797932] audit: type=1400 audit(1569021298.765:68): avc: denied { name_connect } for pid=8358 comm="syz-executor.1" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 23:14:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000840)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a40, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmsg$sock(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="742f398ea3bf32d52db6cd57c6b98d1ea935d64ec0b16f649981bcbabe3aeda7ed57d711bd5578e307c82866b502983aeaabb413443a22bf672394f8e23329173881dce124a0a820dba0ff85a95ae62bc902c7b9df2f16408cdf58e0b8a46de125b8e5b931b17b778ff3197e347a71e2e0b5e25c42e0653a372b4eb7127fac5121f61ae3d668898c2219ebbdfa989ab9112014005415650d77d386eb0a8776f6f1902afa7b06182864beea49317b0da5eec188728c05d51c2f900d66412b6d2a4fff560e1a9b3a4cb98cd1c9f0d7c0113cbc925b81126ae0737de202dba8d3fb45e56b4276a33b2a2367019cc0", 0xed}], 0x1}, 0x280000c0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) memfd_create(&(0x7f0000000140)='security-keyring@.\x00', 0x6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000ec0)=ANY=[@ANYBLOB='F', @ANYBLOB="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"/1117], 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000200)={0x960}) shutdown(r0, 0x1) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TCGETX(r6, 0x5432, &(0x7f0000000000)) 23:14:59 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) memfd_create(&(0x7f0000000380)='\x00', 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) pipe(0x0) mknod$loop(&(0x7f00000000c0)='./file1\x00', 0x211, 0x1) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file1'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) truncate(&(0x7f0000000080)='./file1\x00', 0x0) 23:14:59 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000040)=@full={0xb, @dev, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) 23:14:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x100000006, 0x0, 0x0, 0x40007ffc0000}]}) 23:14:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x20}, 0x34}}, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) [ 195.224827] audit: type=1326 audit(1569021299.285:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8375 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c84a code=0x7ffc0000 23:14:59 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:14:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'team0\x00\n\xfa\xff\xff\xff\xff\xae\x00', 0x100}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xfd\xff\xc0\x00\a\x00\"\xff', 0x4bfd}) [ 195.301909] audit: type=1326 audit(1569021299.285:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8375 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459a09 code=0x7ffc0000 [ 195.342356] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 195.384479] device team0 entered promiscuous mode [ 195.389996] device team_slave_0 entered promiscuous mode [ 195.399407] audit: type=1326 audit(1569021299.285:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8375 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459a09 code=0x7ffc0000 23:14:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="2300000024000b0400"/20, @ANYRES32, @ANYBLOB="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"/304], 0x148}}, 0x0) 23:14:59 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() select(0xf4, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x23) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x7c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 195.434252] device team_slave_1 entered promiscuous mode 23:14:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='dax\x00', 0x0, 0x0) 23:14:59 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) [ 195.471803] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 195.489277] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.554844] audit: type=1326 audit(1569021299.375:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8375 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c84a code=0x7ffc0000 [ 195.589053] 8021q: adding VLAN 0 to HW filter on device team0 23:15:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000840)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a40, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmsg$sock(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="742f398ea3bf32d52db6cd57c6b98d1ea935d64ec0b16f649981bcbabe3aeda7ed57d711bd5578e307c82866b502983aeaabb413443a22bf672394f8e23329173881dce124a0a820dba0ff85a95ae62bc902c7b9df2f16408cdf58e0b8a46de125b8e5b931b17b778ff3197e347a71e2e0b5e25c42e0653a372b4eb7127fac5121f61ae3d668898c2219ebbdfa989ab9112014005415650d77d386eb0a8776f6f1902afa7b06182864beea49317b0da5eec188728c05d51c2f900d66412b6d2a4fff560e1a9b3a4cb98cd1c9f0d7c0113cbc925b81126ae0737de202dba8d3fb45e56b4276a33b2a2367019cc0", 0xed}], 0x1}, 0x280000c0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) memfd_create(&(0x7f0000000140)='security-keyring@.\x00', 0x6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000ec0)=ANY=[@ANYBLOB='F', @ANYBLOB="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"/1117], 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000200)={0x960}) shutdown(r0, 0x1) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TCGETX(r6, 0x5432, &(0x7f0000000000)) 23:15:00 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:15:00 executing program 0: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x1d, 0x297ef) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0xfffffffffffffed3, 0x0}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x61) 23:15:00 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000000c0)) 23:15:00 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) connect$unix(r2, &(0x7f0000fce000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 23:15:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "270a2274179f9507646ca996fa9cce10cce4e0886d9501f11684b86b43044738a761c09cfc08add7d9ef4d2e949aee8d8a116d1f298976a1fce507407676d0a7172416ad721df78b00"}, 0x285) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x27) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 23:15:00 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:15:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="4801000024000b0400"/20, @ANYRES32=r2, @ANYBLOB="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"/304], 0x148}}, 0x0) 23:15:00 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x10001) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0xc0140, 0x0) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, 0x0, 0x254) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x11, &(0x7f0000000000), &(0x7f0000000300)=0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x80) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r2, 0x0, 0x3ffffffd) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2100008}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)=ANY=[@ANYBLOB="ecee374b224b4707f1f8f50cf922cd9bfc9c51cbae695368f9e45a333d43dccb5f8747c94bd63a3564aed73b8f2df552ec4a56dfeed2f103440e0ea2f2690b85b10eca9bce245d12952c4343dea20d58ddeddbb885c030210ef962a5970291c5637d924a23f3b248df88a68b34159cfa90a5008e63a3ba7066f3151ad24cc4ec7289b9bc0a7acbf703df9c7019a5a3ee0e12c694b99f865c614c66d1e72757d27ea48d4be9bde408147e21a81ee8238b116afa7c234220b0afc4b7e38af094a5dec123d252ed1974fcd73fae75", @ANYRES16=r5, @ANYBLOB="000325bd70000300ffff02000000080611d0c75765af01004e220000080001004e21000008000600ffffffff"], 0x3}}, 0x40) getpgrp(0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000140)="f3fbd2e58ffbc7bba0679c67fdcd14c4ac2ca59d13f3dea78d6eed67dd8f4381b16d21d186082ea9033a58f1f07f15bacab07e295bf99c00efb43b36dda8b3c81e83786c1021f6feedb7f749", 0x4c) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/126, 0x7e) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000580)={0x0, 0x5, 0x4d, 0x8, 0x8}, 0x14) poll(&(0x7f0000000200)=[{r4}, {r0}, {0xffffffffffffffff, 0x420}, {r4, 0x1060}, {r4}, {r4}], 0x6, 0xfffffffffffffffb) r6 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 23:15:00 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:15:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:00 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000011000000000000001100"/26], 0x1a) [ 196.510122] IPVS: ftp: loaded support on port[0] = 21 23:15:00 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 23:15:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x9, @ipv6=@loopback}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 23:15:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000840)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x21a40, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) sendmsg$sock(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="742f398ea3bf32d52db6cd57c6b98d1ea935d64ec0b16f649981bcbabe3aeda7ed57d711bd5578e307c82866b502983aeaabb413443a22bf672394f8e23329173881dce124a0a820dba0ff85a95ae62bc902c7b9df2f16408cdf58e0b8a46de125b8e5b931b17b778ff3197e347a71e2e0b5e25c42e0653a372b4eb7127fac5121f61ae3d668898c2219ebbdfa989ab9112014005415650d77d386eb0a8776f6f1902afa7b06182864beea49317b0da5eec188728c05d51c2f900d66412b6d2a4fff560e1a9b3a4cb98cd1c9f0d7c0113cbc925b81126ae0737de202dba8d3fb45e56b4276a33b2a2367019cc0", 0xed}], 0x1}, 0x280000c0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) memfd_create(&(0x7f0000000140)='security-keyring@.\x00', 0x6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000ec0)=ANY=[@ANYBLOB='F', @ANYBLOB="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"/1117], 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000200)={0x960}) shutdown(r0, 0x1) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TCGETX(r6, 0x5432, &(0x7f0000000000)) 23:15:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x9, @ipv6=@loopback}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 23:15:00 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x6029, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x1b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) [ 197.038504] ================================================================== [ 197.046074] BUG: KASAN: use-after-free in tcp_ack+0x414f/0x4760 [ 197.052145] Read of size 4 at addr ffff888097e2d5ac by task syz-executor.0/8457 [ 197.059579] [ 197.061200] CPU: 0 PID: 8457 Comm: syz-executor.0 Not tainted 4.14.145 #0 [ 197.068111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.077568] Call Trace: [ 197.080329] [ 197.082482] dump_stack+0x138/0x197 [ 197.086124] ? tcp_ack+0x414f/0x4760 [ 197.089858] print_address_description.cold+0x7c/0x1dc [ 197.095560] ? tcp_ack+0x414f/0x4760 [ 197.099321] kasan_report.cold+0xa9/0x2af [ 197.103466] __asan_report_load4_noabort+0x14/0x20 [ 197.108401] tcp_ack+0x414f/0x4760 [ 197.112467] ? save_trace+0x290/0x290 [ 197.116353] ? tcp_fastretrans_alert+0x2620/0x2620 [ 197.121281] ? save_trace+0x290/0x290 [ 197.125092] tcp_rcv_established+0x3e9/0x1650 [ 197.129583] ? rt6_check_expired+0xa5/0x160 [ 197.133898] ? tcp_data_queue+0x3730/0x3730 [ 197.138328] ? ip6_dst_check+0x16a/0x2c0 [ 197.142383] tcp_v6_do_rcv+0x417/0x1190 [ 197.146359] tcp_v6_rcv+0x2446/0x2ed0 [ 197.150155] ? save_trace+0x290/0x290 [ 197.153966] ip6_input_finish+0x300/0x15a0 [ 197.158220] ip6_input+0xd5/0x340 [ 197.161678] ? ip6_input_finish+0x15a0/0x15a0 [ 197.167230] ? ipv6_rcv+0x16aa/0x1d20 [ 197.171019] ? ip6_rcv_finish+0x7a0/0x7a0 [ 197.175343] ip6_rcv_finish+0x23f/0x7a0 [ 197.179401] ipv6_rcv+0xe4d/0x1d20 [ 197.183015] ? put_prev_task_stop+0x348/0x400 [ 197.187496] ? ip6_input+0x340/0x340 [ 197.191209] ? __lock_is_held+0xb6/0x140 [ 197.195631] ? check_preemption_disabled+0x3c/0x250 [ 197.200744] ? ip6_make_skb+0x410/0x410 [ 197.204706] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 197.210146] ? ip6_input+0x340/0x340 [ 197.213864] __netif_receive_skb_core+0x1eae/0x2ca0 [ 197.218873] ? trace_hardirqs_on+0x10/0x10 [ 197.223096] ? enqueue_to_backlog+0xcc0/0xcc0 [ 197.227575] ? process_backlog+0x43e/0x730 [ 197.232143] ? lock_acquire+0x16f/0x430 [ 197.236101] __netif_receive_skb+0x2c/0x1b0 [ 197.240925] ? __netif_receive_skb+0x2c/0x1b0 [ 197.245573] process_backlog+0x21f/0x730 [ 197.249629] ? mark_held_locks+0xb1/0x100 [ 197.253795] net_rx_action+0x490/0xf80 [ 197.257803] ? napi_complete_done+0x4f0/0x4f0 [ 197.262300] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 197.267747] __do_softirq+0x244/0x9a0 [ 197.271906] ? ip6_finish_output2+0x9c0/0x21b0 [ 197.276487] do_softirq_own_stack+0x2a/0x40 [ 197.280794] [ 197.283034] do_softirq.part.0+0x10e/0x160 [ 197.287353] __local_bh_enable_ip+0x154/0x1a0 [ 197.291835] ip6_finish_output2+0x9f3/0x21b0 [ 197.296231] ? ip6_forward_finish+0x480/0x480 [ 197.300805] ? __lock_is_held+0xb6/0x140 [ 197.304865] ? check_preemption_disabled+0x3c/0x250 [ 197.309990] ip6_finish_output+0x4f4/0xb50 [ 197.314232] ? ip6_finish_output+0x4f4/0xb50 [ 197.318833] ip6_output+0x20f/0x6d0 [ 197.322450] ? ip6_finish_output+0xb50/0xb50 [ 197.326841] ? __lock_is_held+0xb6/0x140 [ 197.330889] ? check_preemption_disabled+0x3c/0x250 [ 197.335894] ? ip6_fragment+0x32c0/0x32c0 [ 197.340034] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 197.345482] ip6_xmit+0xd53/0x1eb0 [ 197.349009] ? ip6_finish_output2+0x21b0/0x21b0 [ 197.353658] ? ip6_dst_check+0x86/0x2c0 [ 197.357621] ? save_trace+0x290/0x290 [ 197.361403] ? ip6_append_data+0x2f0/0x2f0 [ 197.365651] ? __lock_is_held+0xb6/0x140 [ 197.369809] ? check_preemption_disabled+0x3c/0x250 [ 197.375177] inet6_csk_xmit+0x286/0x4d0 [ 197.379140] ? inet6_csk_update_pmtu+0x140/0x140 [ 197.384317] ? tcp_md5_do_lookup+0x1d3/0x530 [ 197.388731] __tcp_transmit_skb+0x172c/0x2fe0 [ 197.393216] ? __tcp_select_window+0x6e0/0x6e0 [ 197.397784] ? kvm_clock_read+0x23/0x40 [ 197.401746] ? sched_clock_cpu+0x1b/0x1c0 [ 197.405879] ? tcp_small_queue_check+0x184/0x1e0 [ 197.410621] tcp_write_xmit+0x523/0x4960 [ 197.414767] ? tcp_v6_md5_lookup+0x23/0x30 [ 197.419093] ? tcp_established_options+0x2c5/0x420 [ 197.424211] ? tcp_current_mss+0x101/0x2f0 [ 197.428454] __tcp_push_pending_frames+0xa6/0x260 [ 197.433378] tcp_send_fin+0x17e/0xc40 [ 197.437177] tcp_close+0xcc8/0xfb0 [ 197.440699] ? lock_acquire+0x16f/0x430 [ 197.444663] ? ip_mc_drop_socket+0x1d6/0x230 [ 197.449161] inet_release+0xec/0x1c0 [ 197.452878] inet6_release+0x53/0x80 [ 197.456577] __sock_release+0xce/0x2b0 [ 197.460445] ? __sock_release+0x2b0/0x2b0 [ 197.464571] sock_close+0x1b/0x30 [ 197.468010] __fput+0x275/0x7a0 [ 197.471506] ____fput+0x16/0x20 [ 197.474857] task_work_run+0x114/0x190 [ 197.478818] exit_to_usermode_loop+0x1da/0x220 [ 197.483392] do_syscall_64+0x4bc/0x640 [ 197.487266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.492105] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.497304] RIP: 0033:0x4136f1 [ 197.501805] RSP: 002b:00007ffc49a9a420 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 197.509519] RAX: 0000000000000000 RBX: 0000000000000009 RCX: 00000000004136f1 [ 197.516979] RDX: 0000000000000000 RSI: 00000000000009a7 RDI: 0000000000000008 [ 197.524698] RBP: 0000000000000001 R08: 00000000e64469a7 R09: 00000000e64469ab [ 197.531959] R10: 00007ffc49a9a500 R11: 0000000000000293 R12: 000000000075c9a0 [ 197.539215] R13: 000000000075c9a0 R14: 00000000007616e0 R15: 000000000075c124 [ 197.546488] [ 197.548100] Allocated by task 8459: [ 197.551719] save_stack_trace+0x16/0x20 [ 197.555672] save_stack+0x45/0xd0 [ 197.559101] kasan_kmalloc+0xce/0xf0 [ 197.562801] kasan_slab_alloc+0xf/0x20 [ 197.566668] kmem_cache_alloc_node+0x144/0x780 [ 197.571317] __alloc_skb+0x9c/0x500 [ 197.574924] sk_stream_alloc_skb+0xb3/0x780 [ 197.579223] tcp_sendmsg_locked+0xf61/0x3200 [ 197.583613] tcp_sendmsg+0x30/0x50 [ 197.587134] inet_sendmsg+0x122/0x500 [ 197.590917] sock_sendmsg+0xce/0x110 [ 197.594607] SYSC_sendto+0x206/0x310 [ 197.598309] SyS_sendto+0x40/0x50 [ 197.601929] do_syscall_64+0x1e8/0x640 [ 197.605808] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.610976] [ 197.612584] Freed by task 8459: [ 197.615941] save_stack_trace+0x16/0x20 [ 197.620414] save_stack+0x45/0xd0 [ 197.623933] kasan_slab_free+0x75/0xc0 [ 197.627808] kmem_cache_free+0x83/0x2b0 [ 197.631789] kfree_skbmem+0x8d/0x120 [ 197.635490] __kfree_skb+0x1e/0x30 [ 197.639019] tcp_remove_empty_skb.part.0+0x231/0x2e0 [ 197.644131] tcp_sendmsg_locked+0x1ced/0x3200 [ 197.648615] tcp_sendmsg+0x30/0x50 [ 197.652145] inet_sendmsg+0x122/0x500 [ 197.655941] sock_sendmsg+0xce/0x110 [ 197.659658] SYSC_sendto+0x206/0x310 [ 197.663356] SyS_sendto+0x40/0x50 [ 197.667691] do_syscall_64+0x1e8/0x640 [ 197.672090] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.677378] [ 197.678990] The buggy address belongs to the object at ffff888097e2d580 [ 197.678990] which belongs to the cache skbuff_fclone_cache of size 472 [ 197.692324] The buggy address is located 44 bytes inside of [ 197.692324] 472-byte region [ffff888097e2d580, ffff888097e2d758) [ 197.704114] The buggy address belongs to the page: [ 197.709049] page:ffffea00025f8b40 count:1 mapcount:0 mapping:ffff888097e2d080 index:0xffff888097e2d300 [ 197.718487] flags: 0x1fffc0000000100(slab) [ 197.722713] raw: 01fffc0000000100 ffff888097e2d080 ffff888097e2d300 0000000100000003 [ 197.730582] raw: ffffea00025254e0 ffffea0002324160 ffff88821b7203c0 0000000000000000 [ 197.739306] page dumped because: kasan: bad access detected [ 197.744994] [ 197.746616] Memory state around the buggy address: [ 197.751813] ffff888097e2d480: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 197.759268] ffff888097e2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 197.766622] >ffff888097e2d580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.774399] ^ [ 197.779048] ffff888097e2d600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.786395] ffff888097e2d680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.793733] ================================================================== [ 197.801071] Disabling lock debugging due to kernel taint [ 197.806593] Kernel panic - not syncing: panic_on_warn set ... [ 197.806593] [ 197.813976] CPU: 0 PID: 8457 Comm: syz-executor.0 Tainted: G B 4.14.145 #0 [ 197.822093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.831427] Call Trace: [ 197.833998] [ 197.836149] dump_stack+0x138/0x197 [ 197.839757] ? tcp_ack+0x414f/0x4760 [ 197.843451] panic+0x1f2/0x426 [ 197.846633] ? add_taint.cold+0x16/0x16 [ 197.850593] kasan_end_report+0x47/0x4f [ 197.854544] kasan_report.cold+0x130/0x2af [ 197.858756] __asan_report_load4_noabort+0x14/0x20 [ 197.863665] tcp_ack+0x414f/0x4760 [ 197.867188] ? save_trace+0x290/0x290 [ 197.870986] ? tcp_fastretrans_alert+0x2620/0x2620 [ 197.875893] ? save_trace+0x290/0x290 [ 197.879679] tcp_rcv_established+0x3e9/0x1650 [ 197.884153] ? rt6_check_expired+0xa5/0x160 [ 197.888542] ? tcp_data_queue+0x3730/0x3730 [ 197.892841] ? ip6_dst_check+0x16a/0x2c0 [ 197.896882] tcp_v6_do_rcv+0x417/0x1190 [ 197.900838] tcp_v6_rcv+0x2446/0x2ed0 [ 197.904619] ? save_trace+0x290/0x290 [ 197.908408] ip6_input_finish+0x300/0x15a0 [ 197.912658] ip6_input+0xd5/0x340 [ 197.916095] ? ip6_input_finish+0x15a0/0x15a0 [ 197.920578] ? ipv6_rcv+0x16aa/0x1d20 [ 197.924389] ? ip6_rcv_finish+0x7a0/0x7a0 [ 197.928524] ip6_rcv_finish+0x23f/0x7a0 [ 197.932488] ipv6_rcv+0xe4d/0x1d20 [ 197.936037] ? put_prev_task_stop+0x348/0x400 [ 197.940532] ? ip6_input+0x340/0x340 [ 197.944312] ? __lock_is_held+0xb6/0x140 [ 197.948367] ? check_preemption_disabled+0x3c/0x250 [ 197.953712] ? ip6_make_skb+0x410/0x410 [ 197.957766] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 197.963195] ? ip6_input+0x340/0x340 [ 197.966899] __netif_receive_skb_core+0x1eae/0x2ca0 [ 197.971915] ? trace_hardirqs_on+0x10/0x10 [ 197.976151] ? enqueue_to_backlog+0xcc0/0xcc0 [ 197.980627] ? process_backlog+0x43e/0x730 [ 197.984869] ? lock_acquire+0x16f/0x430 [ 197.989273] __netif_receive_skb+0x2c/0x1b0 [ 197.993576] ? __netif_receive_skb+0x2c/0x1b0 [ 197.998053] process_backlog+0x21f/0x730 [ 198.002101] ? mark_held_locks+0xb1/0x100 [ 198.006230] net_rx_action+0x490/0xf80 [ 198.010099] ? napi_complete_done+0x4f0/0x4f0 [ 198.014578] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 198.020097] __do_softirq+0x244/0x9a0 [ 198.023879] ? ip6_finish_output2+0x9c0/0x21b0 [ 198.028437] do_softirq_own_stack+0x2a/0x40 [ 198.032740] [ 198.034966] do_softirq.part.0+0x10e/0x160 [ 198.039178] __local_bh_enable_ip+0x154/0x1a0 [ 198.043666] ip6_finish_output2+0x9f3/0x21b0 [ 198.048091] ? ip6_forward_finish+0x480/0x480 [ 198.052594] ? __lock_is_held+0xb6/0x140 [ 198.057003] ? check_preemption_disabled+0x3c/0x250 [ 198.062093] ip6_finish_output+0x4f4/0xb50 [ 198.066335] ? ip6_finish_output+0x4f4/0xb50 [ 198.070831] ip6_output+0x20f/0x6d0 [ 198.074449] ? ip6_finish_output+0xb50/0xb50 [ 198.078848] ? __lock_is_held+0xb6/0x140 [ 198.082893] ? check_preemption_disabled+0x3c/0x250 [ 198.087894] ? ip6_fragment+0x32c0/0x32c0 [ 198.092028] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 198.097459] ip6_xmit+0xd53/0x1eb0 [ 198.100994] ? ip6_finish_output2+0x21b0/0x21b0 [ 198.105749] ? ip6_dst_check+0x86/0x2c0 [ 198.109719] ? save_trace+0x290/0x290 [ 198.113681] ? ip6_append_data+0x2f0/0x2f0 [ 198.117905] ? __lock_is_held+0xb6/0x140 [ 198.122641] ? check_preemption_disabled+0x3c/0x250 [ 198.127661] inet6_csk_xmit+0x286/0x4d0 [ 198.131616] ? inet6_csk_update_pmtu+0x140/0x140 [ 198.136375] ? tcp_md5_do_lookup+0x1d3/0x530 [ 198.140773] __tcp_transmit_skb+0x172c/0x2fe0 [ 198.145269] ? __tcp_select_window+0x6e0/0x6e0 [ 198.149836] ? kvm_clock_read+0x23/0x40 [ 198.153793] ? sched_clock_cpu+0x1b/0x1c0 [ 198.158460] ? tcp_small_queue_check+0x184/0x1e0 [ 198.163283] tcp_write_xmit+0x523/0x4960 [ 198.167324] ? tcp_v6_md5_lookup+0x23/0x30 [ 198.171726] ? tcp_established_options+0x2c5/0x420 [ 198.176638] ? tcp_current_mss+0x101/0x2f0 [ 198.180945] __tcp_push_pending_frames+0xa6/0x260 [ 198.185771] tcp_send_fin+0x17e/0xc40 [ 198.190362] tcp_close+0xcc8/0xfb0 [ 198.193884] ? lock_acquire+0x16f/0x430 [ 198.197863] ? ip_mc_drop_socket+0x1d6/0x230 [ 198.202358] inet_release+0xec/0x1c0 [ 198.206074] inet6_release+0x53/0x80 [ 198.209777] __sock_release+0xce/0x2b0 [ 198.213647] ? __sock_release+0x2b0/0x2b0 [ 198.217795] sock_close+0x1b/0x30 [ 198.221240] __fput+0x275/0x7a0 [ 198.224521] ____fput+0x16/0x20 [ 198.227807] task_work_run+0x114/0x190 [ 198.231701] exit_to_usermode_loop+0x1da/0x220 [ 198.236266] do_syscall_64+0x4bc/0x640 [ 198.240712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.245573] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.250767] RIP: 0033:0x4136f1 [ 198.253939] RSP: 002b:00007ffc49a9a420 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 198.261892] RAX: 0000000000000000 RBX: 0000000000000009 RCX: 00000000004136f1 [ 198.269258] RDX: 0000000000000000 RSI: 00000000000009a7 RDI: 0000000000000008 [ 198.276638] RBP: 0000000000000001 R08: 00000000e64469a7 R09: 00000000e64469ab [ 198.283895] R10: 00007ffc49a9a500 R11: 0000000000000293 R12: 000000000075c9a0 [ 198.292101] R13: 000000000075c9a0 R14: 00000000007616e0 R15: 000000000075c124 [ 198.300217] Kernel Offset: disabled [ 198.303842] Rebooting in 86400 seconds..