[ 40.677577] audit: type=1800 audit(1569981478.142:32): pid=7513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.414777] audit: type=1800 audit(1569981478.982:33): pid=7513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts. 2019/10/02 01:58:07 fuzzer started syzkaller login: [ 49.503367] kauditd_printk_skb: 2 callbacks suppressed [ 49.503382] audit: type=1400 audit(1569981487.072:36): avc: denied { map } for pid=7696 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/02 01:58:08 dialing manager at 10.128.0.105:35887 2019/10/02 01:58:08 syscalls: 2516 2019/10/02 01:58:08 code coverage: enabled 2019/10/02 01:58:08 comparison tracing: enabled 2019/10/02 01:58:08 extra coverage: extra coverage is not supported by the kernel 2019/10/02 01:58:08 setuid sandbox: enabled 2019/10/02 01:58:08 namespace sandbox: enabled 2019/10/02 01:58:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/02 01:58:08 fault injection: enabled 2019/10/02 01:58:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/02 01:58:08 net packet injection: enabled 2019/10/02 01:58:08 net device setup: enabled 02:00:37 executing program 0: [ 200.353523] audit: type=1400 audit(1569981637.922:37): avc: denied { map } for pid=7713 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14983 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 200.484634] IPVS: ftp: loaded support on port[0] = 21 02:00:38 executing program 1: [ 200.615639] chnl_net:caif_netlink_parms(): no params data found [ 200.677304] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.685409] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.693401] device bridge_slave_0 entered promiscuous mode [ 200.702944] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.710096] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.719238] device bridge_slave_1 entered promiscuous mode [ 200.742451] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 200.751969] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 200.774600] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 200.783468] team0: Port device team_slave_0 added 02:00:38 executing program 2: [ 200.790433] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 200.798921] team0: Port device team_slave_1 added [ 200.804528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 200.812270] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 200.816396] IPVS: ftp: loaded support on port[0] = 21 [ 200.882311] device hsr_slave_0 entered promiscuous mode [ 200.927845] device hsr_slave_1 entered promiscuous mode [ 200.968185] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 200.975333] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 200.993410] IPVS: ftp: loaded support on port[0] = 21 02:00:38 executing program 3: [ 201.046949] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.053596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.060830] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.067262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.203273] chnl_net:caif_netlink_parms(): no params data found [ 201.265157] IPVS: ftp: loaded support on port[0] = 21 02:00:38 executing program 4: [ 201.337066] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 201.346709] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.365138] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.378594] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.400936] device bridge_slave_0 entered promiscuous mode [ 201.426158] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 201.509034] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.515449] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.540586] device bridge_slave_1 entered promiscuous mode [ 201.584801] chnl_net:caif_netlink_parms(): no params data found [ 201.606840] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.616313] bond0: Enslaving bond_slave_1 as an active interface with an up link 02:00:39 executing program 5: [ 201.633728] IPVS: ftp: loaded support on port[0] = 21 [ 201.649559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.665138] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.693583] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.704917] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 201.740100] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 201.746229] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.775381] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.782015] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.789082] device bridge_slave_0 entered promiscuous mode [ 201.796236] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.802983] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.810627] device bridge_slave_1 entered promiscuous mode [ 201.821595] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.829468] team0: Port device team_slave_0 added [ 201.837341] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.844774] team0: Port device team_slave_1 added [ 201.864335] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 201.872828] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 201.886573] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 201.902966] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.919512] IPVS: ftp: loaded support on port[0] = 21 [ 201.939813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.948247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.956068] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.962844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.971411] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.039542] device hsr_slave_0 entered promiscuous mode [ 202.077862] device hsr_slave_1 entered promiscuous mode [ 202.118245] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 202.134467] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 202.142131] team0: Port device team_slave_0 added [ 202.156775] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 202.164661] team0: Port device team_slave_1 added [ 202.170202] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 202.177055] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 202.187874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 202.213847] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 202.232578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.241931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.250062] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.256437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.293792] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 202.326869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.369522] device hsr_slave_0 entered promiscuous mode [ 202.448064] device hsr_slave_1 entered promiscuous mode [ 202.489761] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 202.508962] chnl_net:caif_netlink_parms(): no params data found [ 202.521361] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 202.530093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.539541] chnl_net:caif_netlink_parms(): no params data found [ 202.559970] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 202.576602] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 202.586825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 202.626424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.635141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.643196] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.662962] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.669746] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.676850] device bridge_slave_0 entered promiscuous mode [ 202.686903] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.693416] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.700985] device bridge_slave_1 entered promiscuous mode [ 202.720214] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 202.732791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 202.752873] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.772264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.780641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.791876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 202.798969] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.805403] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.813462] device bridge_slave_0 entered promiscuous mode [ 202.831265] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 202.846885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.857774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.868640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 202.876004] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.882668] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.890902] device bridge_slave_1 entered promiscuous mode [ 202.916832] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 202.924613] team0: Port device team_slave_0 added [ 202.930507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.939027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.948598] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 202.954879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.979101] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 202.986512] team0: Port device team_slave_1 added [ 202.995319] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.005600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.027201] chnl_net:caif_netlink_parms(): no params data found [ 203.073616] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.141097] device hsr_slave_0 entered promiscuous mode [ 203.177993] device hsr_slave_1 entered promiscuous mode [ 203.221737] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 203.230371] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 203.237132] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.243863] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.251284] device bridge_slave_0 entered promiscuous mode [ 203.263156] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.286110] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 203.293701] team0: Port device team_slave_0 added [ 203.300191] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.306542] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.314023] device bridge_slave_1 entered promiscuous mode [ 203.330269] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 203.338190] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.347209] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.361390] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 203.370263] team0: Port device team_slave_1 added [ 203.375666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.385043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.399973] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 203.407275] team0: Port device team_slave_0 added [ 203.416271] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 203.425180] team0: Port device team_slave_1 added [ 203.445373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.461766] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 203.468789] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.509743] device hsr_slave_0 entered promiscuous mode [ 203.548253] device hsr_slave_1 entered promiscuous mode [ 203.614667] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.622356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.631683] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 203.654160] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 203.662245] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 203.675627] audit: type=1400 audit(1569981641.242:38): avc: denied { associate } for pid=7714 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 203.685531] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.704351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.711120] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.717482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.779745] device hsr_slave_0 entered promiscuous mode [ 203.838278] device hsr_slave_1 entered promiscuous mode [ 203.898750] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 203.906534] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 203.926380] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.932845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.939549] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.945932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.964539] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.982973] bridge0: port 2(bridge_slave_1) entered disabled state 02:00:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000080)="66b829018ec0b9800000c00f3235002000000f3066baf80cb8c8f61a8eef66bafc0ced0f787e0036400fc75a00c4e1f9e601c4018575504f0f87d485a71b64440f01c43e662666470f38804185", 0x4d}], 0x1, 0x0, 0x0, 0xfffffffffffffe96) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0x0, 0x0, 0x0, [], 0x0}) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 203.993651] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.001618] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.031263] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.049113] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 204.055776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.064709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.091992] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 204.099144] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.123339] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 204.142063] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 204.150956] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 204.157211] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.188781] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 204.206945] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 204.221580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 02:00:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f043051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) socket$kcm(0xa, 0x2, 0x11) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x20000001) [ 204.232986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.243894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.256899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.269755] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.283515] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.293616] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 204.301162] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.315310] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 204.322360] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.329705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.338027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.345432] audit: type=1400 audit(1569981641.912:39): avc: denied { prog_load } for pid=7743 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 204.368962] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.375404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.384927] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 204.392616] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.399815] audit: type=1400 audit(1569981641.962:40): avc: denied { prog_run } for pid=7743 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 204.430887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 02:00:42 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 204.443674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.463828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.477969] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.484382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.493896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.505815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.515673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.523676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.532374] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.538796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.541203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.558999] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 204.578079] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 204.584189] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.594727] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 204.612694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 204.622294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.637604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.644652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.652209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.662742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.672374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.680378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.688168] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.694528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.701993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.710989] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.726042] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.736480] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 204.744870] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.755397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.768311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.783747] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.790235] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.798797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.807252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.815737] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.822354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.836626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.844883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.860080] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.866525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.883297] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 204.892933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.903647] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 204.915542] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 204.926875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.944750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.955921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.971586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.983336] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.989805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.004921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.013342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.029887] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.041687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.054332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.067017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.075418] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.085583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.093234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.101814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.110851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.119581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.131371] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 205.138081] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.145835] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 205.159107] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.169229] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.183686] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.191267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.201526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.210414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.219154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.227271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.236126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.244850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.255982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.268333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 205.278741] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.296344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 205.304934] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 205.316390] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 205.324775] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.333443] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.342884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.356009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.364915] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.371386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.383350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.391303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.400232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.409041] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.417249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.427188] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.435662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.444377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.453153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.462314] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.473888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.493278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 02:00:43 executing program 0: ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) [ 205.509506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 205.516708] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.524572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.540238] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.557303] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.563803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.572376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.581063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.589499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.598202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.608824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 205.616864] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.627300] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 205.636831] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 205.643599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.654564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.664332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.672533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.680817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.688871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.698928] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 205.706914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 02:00:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) shutdown(r0, 0x0) [ 205.716339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 205.728030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.737110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.753084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.762915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.780757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.814104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.824334] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 205.836569] hrtimer: interrupt took 37039 ns [ 205.839783] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 205.857318] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 205.865261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.881650] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 205.889253] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.896899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.906437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.915024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.923031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.931829] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.962091] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 205.970794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.983610] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 02:00:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @tcp={{0x2c00, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 206.015725] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 206.025640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.040464] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.060565] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 206.077330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 206.092955] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 206.105957] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.117997] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 206.124946] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 206.133578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.148684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.156461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 02:00:43 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x73) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000480)={'#! ', './file0', [{0x20, 'threaded\x00'}, {0x20, '\\ppp0#securityppp1em1'}, {0x20, '\\'}, {0x20, './cgroup/syz1\x00\xba\x9d\xf5yC\x8a'}, {0x20, 'threaded\x00'}], 0xa, "5426b2df8a2005c007b7e1a98f05bc613f6c71a314f84c4fbd199b7bf11b6695fdeb6b0468e3e4d6b4b07e96bbb31704cfda6d3d0f82f3455a3414ceba6efd6e18c99fba820f74661fa1a9f37400ab7d6b100ecd31021d01f0fe7166ae48612309c1e00aa1bf4aa08e19f8809f0a"}, 0xba) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00\xba\x9d\xf5yC\x8a', 0x200002, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) [ 206.171112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.181219] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 206.190038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.209439] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.221669] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.244125] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.353456] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 02:00:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000000c0), 0x4) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 02:00:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r0, 0x2285, 0x0) socket(0x10, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="aefdda9d240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000100)="aa1d484e24002000a84d4583671e120755272bb736be94d9fc56c9953fbd80630600007704a71e023a27b2", 0x2b}], 0x2) [ 206.622203] audit: type=1400 audit(1569981644.032:41): avc: denied { map_create } for pid=7770 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 206.651157] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.659435] sg_write: data in/out 2097152/1 bytes for SCSI command 0x4-- guessing data in; [ 206.659435] program syz-executor.2 not setting count and/or reply_len properly 02:00:44 executing program 3: setreuid(0x0, 0xee01) 02:00:44 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e", 0x24}], 0x1}, 0x0) 02:00:44 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000040)=0x9, 0x4) bind(r0, &(0x7f0000000580)=@in, 0x70) 02:00:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r0, 0x2285, 0x0) socket(0x10, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="aefdda9d240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000100)="aa1d484e24002000a84d4583671e120755272bb736be94d9fc56c9953fbd80630600007704a71e023a27b2", 0x2b}], 0x2) 02:00:44 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) connect$caif(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) [ 206.922352] sg_write: data in/out 2097152/1 bytes for SCSI command 0x4-- guessing data in; [ 206.922352] program syz-executor.2 not setting count and/or reply_len properly 02:00:44 executing program 5: 02:00:44 executing program 2: 02:00:44 executing program 5: 02:00:44 executing program 2: 02:00:44 executing program 0: 02:00:45 executing program 1: 02:00:45 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x14080, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000400000/0x18000)=nil, 0x0, 0x0, 0x40, &(0x7f00000002c0), 0x0) 02:00:45 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:45 executing program 5: 02:00:45 executing program 2: 02:00:45 executing program 0: 02:00:45 executing program 5: 02:00:45 executing program 0: 02:00:45 executing program 2: [ 207.550563] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:45 executing program 0: 02:00:45 executing program 5: 02:00:45 executing program 1: 02:00:45 executing program 2: 02:00:45 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f00000003c0)="12000000a900e7ef007b1a3fcd000040e860", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}], 0x1}}], 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000a80)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0}, {&(0x7f0000000180)=""/114, 0x72}], 0x3}}], 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 207.843409] bond0: Releasing backup interface bond_slave_1 [ 207.905990] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=169 sclass=netlink_route_socket pig=7860 comm=syz-executor.3 02:00:45 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xffffffc6) r3 = socket$kcm(0x29, 0x2, 0x0) splice(r1, 0x0, r3, 0x0, 0x103fffffd, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") 02:00:45 executing program 2: 02:00:45 executing program 0: 02:00:45 executing program 1: 02:00:45 executing program 3: [ 207.959653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=169 sclass=netlink_route_socket pig=7860 comm=syz-executor.3 [ 207.985147] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000006840)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/62, 0x3e}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/38, 0x26}, {&(0x7f0000000a80)=""/108, 0x6c}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 02:00:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r1, 0x2285, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)="aefdda9d240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0xffb6}, {&(0x7f0000000100)="aa1d484ea6ff2000a84d4583671e120755272bb736be94d9fc56c9953fbd80630600097704a71e023a27", 0x2a}], 0x2) 02:00:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7d1}, 0x1c) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710d1070000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 02:00:45 executing program 3: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='errors=withdraw,statfs_quantum=-']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 208.101970] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:45 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 208.261091] gfs2: not a GFS2 filesystem 02:00:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") unshare(0x24020400) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') accept4$unix(r1, 0x0, 0x0, 0x0) [ 208.292871] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:45 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, &(0x7f0000000000)={0x3}) [ 208.359842] gfs2: not a GFS2 filesystem 02:00:46 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000880)="24000000520007041dfffd946fa283000a200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:00:46 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:46 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "f0b128", 0x18, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[@hopopts={0x2f}], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "550670", 0x0, "52adbe"}}}}}}}, 0x0) 02:00:46 executing program 0: unshare(0x2000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:00:46 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, &(0x7f0000000000)={0x3}) [ 208.978969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0xffa4, &(0x7f0000000040)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x1) creat(&(0x7f0000000300)='./file0/file0\x00', 0x20) r6 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nbd(0x0) pipe2(0x0, 0x10c800) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x41110424}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB='@\x00\x00', @ANYRES16=r7, @ANYBLOB="170726bd7000fddbdf2503000000140007", @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYBLOB="0400050300000000000000"], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x800) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$NBD_CMD_CONNECT(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x64, r7, 0xf0c, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8}, {0x8, 0x1, r9}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1d}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x104}]}, 0x64}, 0x1, 0x0, 0x0, 0x8002}, 0x4000002) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 02:00:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0108000e53683c478800000000340100", "1188f6054e330f878bdf4d09d269a4003fedf462"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x9821, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000440)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 02:00:46 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, &(0x7f0000000000)={0x3}) 02:00:46 executing program 0: io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 02:00:46 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:46 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) madvise(&(0x7f0000e87000/0x1000)=nil, 0x1000, 0x13) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) clock_settime(0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r3, 0x0) getpid() fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchdir(0xffffffffffffffff) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) lstat(&(0x7f0000000480)='./bus\x00', &(0x7f0000000680)) getresgid(&(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000680)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) fchdir(0xffffffffffffffff) socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, 0x0, 0x0) r7 = dup2(0xffffffffffffffff, r6) dup2(r7, r5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000500)) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000340)='./bus\x00', &(0x7f0000000400)='fuseblk\x00', 0x10, &(0x7f00000009c0)=ANY=[]) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {}, [{0x2, 0x6, 0xee01}], {0x4, 0x2}, [{0x8, 0x0, r4}, {0x8, 0x4}], {}, {0x20, 0x6}}, 0x3c, 0x0) 02:00:46 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, &(0x7f0000000000)={0x3}) [ 209.225846] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 209.229190] kvm: emulating exchange as write [ 209.236845] audit: type=1400 audit(1569981646.812:42): avc: denied { create } for pid=7938 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:00:46 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) clock_settime(0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r1, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040)='security.ima\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') lstat(0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) lstat(0x0, 0x0) getresgid(&(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000680)) write(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000340)='./bus\x00', &(0x7f0000000400)='fuseblk\x00', 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {}, [{0x2, 0x0, 0xee01}], {0x4, 0x2}, [], {0x10, 0x4}}, 0x2c, 0x0) 02:00:46 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 209.329662] audit: type=1400 audit(1569981646.902:43): avc: denied { write } for pid=7938 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:00:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0108000e53683c478800000000340100", "1188f6054e330f878bdf4d09d269a4003fedf462"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x9821, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000440)={0x0, 0x0, 0x2080, {}, [], "12ec107c588333300f0efb9376a31de27ff749fa4f5927e01256d4696a38a1a3f759adaa52c6ef1c6cbde033b4c252281620e3a8455c5dee4ee47af8cdecd4d219f174d4d71134967e7d2f13615d2fda3c95b26c26f2c6e342704ddb7e70a01628d4178cfa5370d4f24842d08ebcef47f4128bbc67db0f868428fe69441faeb204526fc110d0d5311b3498e881debebee9c3fd4e6694ba892bb743c53176d27f39b1e724898d1ad1f0d80dcf05b4aba08378b54b64f70eb9fb85bbe7a3ce7844682a149a8ba83dea66f6bc9b173151e7cbd5707571865b7f062973873ec155dfa890671f1936969991d68458b218ae31986ef07f0829ace36be0b898bed8eb7385102fd20cd25f15fb67e94c8acd61587241c8025f213943405db1ace7dc2d17194fa4895e064c44ac888f816fae949848c3548f25e35f24fcadeb15caaf3114a452b983b405ae9bf5a307d6028f1da76024e36768c48be8ab02966acf1ba85aeaea24b7ba297ebd9e142327d9c20c6cad34b0994ad9292b708bf7dc7d1e886022ac3d45074dfeb078784f39cc5223117f52fed6067156fab290456b028d8f2b47a3a5ae91385fd62b6e57f651fd5aad0095484d788ce9793d9e51c6494aa0dceeccc392a6c7fb38683b93aa655f3bb4cc5bf004d21bf45b6b14b1c728c815e70bf7875032d4b47f65469af3392fbd92468a93ff4ec057972e2dfcf4a74b4ab23e7ea880c01ec0a7a282a77a1d1e2907452079651b770d2e85f7209cd6d9201dc6c393530a34097b3e9d65fc6276a0bf6a37d0b368ebc330cea896cf7b629421029e5c73160d8d1553d0724a3cf51bb442bacf67ad1f9ff654902b812d29542f9470a13ceb9bf59af7a6960c0eecfe285133e57311e10a9114727e8d607a6603c65bde036039f696e951bfac9ecf469e80055482a2653b4c95f3711d26a1243c03f326d6e73b07d478e1a3a6c83267cbc0f90fcba0571ba146794ad666f1138281172142a1e961dcc1806edf82399194ee7a892a6eb54d806067a5d8c9131140073c1d01d4a84d0f8f04fd32a6e686ffaa0846eee5ed5de037a80ccb6a0caef6432daf1c8d6991476f3bfd02a953ebce2af3ca0c78ced7bb2c5e6a4a489563923259bb050e59627424419238cd27c0ecf2373804da66b30fa5b124a4bdb755494fd257eaeafe845407530148e82a932d90f31d649cc3f0f9f60b6931222869a0c4728ddc390c349a5e3eddb64e8e81c7715c72005d24df36f7a8527de93b041877f5bd437a5d26b619a3f3ed3cf413aec61aea03e6c05df344d466895bd0e4ebf03a890887510030f09dc973ad43488561e65b8e9a7224b2d60e4c72c2718c51b6e4b1caf51f15b9b56aa02399725dc1b632b16c1ccb14d267b95cecfd0a99b3412bbf91786c66c6f8b0a0712aec259192061223732aa2ffa0d46fffbf3512cea250b6d72644c3894e8e9e5dc9c4b9af8b8b7b28a977e3cfe6c001474c4a2fda9bee8670d473073ff6c008d0aa844a30ed235e8d2102b4cd89d509bb00e30fcce37a886bd88fe5195640a45dd47b499bd3e3d1a6aa4196b2820348a99332dcd2ab3974dd825c6a937c9e85864f4b2faec13ed8a953473bb9927edab3906fab488b04b07d3567a01dd35da5b5f389fa6e5048a9252f3e8ef55fb0736e50d016164d238d011174d6b1c4b71ea27f778426a6c0a13728274755c11c1ef79d0272dcf50223462a900d1b596d1b5a5fc099dd859b58c2acffb0292c33f7009dff76241c953512a51361fd232665fabb44a919b995ae62f6b3b8fcb96acdc6134f292885b9dcf95f7bff1ae1437b38322701d3c7b21b572f42e509029864044fdd473bc7adce1c110a53a54f54a08480dddf1d542419f42621f467a79b98d1e4bcc4516c0a2432356e1244d28607afa287e2bad529696d58366f1dc1620b0e6983718dc983005f0f3c8805ee8006f1fc7f0107c67646ecac591897f1e6e9cd1cb2de62087c44e603b6bc5ffb25b7a8db515b9e7fc3088ae3e87645cff702636c49d34a41a7329324b393954860f85c98e4fda7096b882ac4026eccbc2ee841cae8184998339ddb445dc2a5939fd26d851ec9e3396802806b0ac604c4acea049663d811d342dfd31fd3b6cacd1f2134f5b1ae3d3e07991cd20306a5d289b0c1cba02f9a54439e36b3f7e4a89983de7a0a5bd48a0fe048776c832ed6292db63daabe79b8b8787d117744fc9b73a3bcfd77ad9efd6d7919eae825dcbb5eab419e8e1990204914b591618ce7ec17470dc3be094d57587f2e975dd86db2194186c7e5b455850a8c018fb21bbfbeab60c0d4d32232fd1844aba9d7f30b6ec6efc7523b2b599cf54de61a60b3990e57fab7935166e2cb85660a65e9b784453405e0b78cea1d3e18072ee119c901cc857455d6deb6e5a62e134ddcd4bb66159991098c8f75b6a9e07d480b872f95ea6b41b4378dfa97d98870dcf1227f1754246e5363dc316754e8e9e638e80b2899626961de8e91d228597c680e12adc8157b418e71040cc7fb61cc08aa91a8b4cb5cf02c303850c6d55af67ac75dfa4da6c5b87a7b7c7c38ca8c32277307799f8743448815fe439cfe54113b2910276e28cf6ba45afdedd1ba93a28bbffe4923ffe2c4a6fce237334ab6f876ac451988a057e50e2012e832d21134798e125cf34ef69579b8eee7871d3726e330d29825c25610640fb11b5ef9abe661bcb42a985ac3677447301b49adc00e420d3b541b41aaf0cb9b5016b84fd6a9993fd3fcfc56cb3cb4823f6ea5f2688275861788e6c32f9183bf594f43af292f725d195dc155969f82060b907c7c1f276af5659fc687d0540ed1ea6b5d9f56cc57dfa7dede1379db172eb437cfe718f174c9215e51f79164ccce2861dc13d08c0f8dc2a5431176739d265602b3d066e9f7cdadff7571f94432f71851995f09f8d1be241fa0e1459825009a466071338fb3937dcd7e63332e491e79d7556f4133e45bfcc7f23b48f09f990bab2a10c22cbf5ec305eff5899385719d12d1888d542e2aa329c222233560187ce67242b359ace51240321c7bacd2247668a03f96b4375a75ce349965130edcbd5019cb72c5d149e291e6f60605050261c13b93c176a0a39a23413388b7b38aa49d6e11ce0541f61841ae159851049a3695f3af7f691128a2d7479223f06657e28b4d5cf4d5d84a5024cc88445df2be31642c71c90641cba9ffae1e8187e86038cd37e206603141972b2313185993a319d176e8ef47d28e93232bd76ce73aaa850e080a261d69e44829bbdca27f002c9b0cac934eaff57ffc43e9e0b2ae7cbff2af2a21d0e6e9f33d3c73c45098fb0231019b495b19c79b9fa567e0cd950dd7af4c00afebaa42f608c5dd6d7cd662a4a5d3a78bddcbd7500678d04be6b6c3bec163e82c7e071b8b25f1d087da9eb0dc95b4b0ff74dbccb35fb1c8766104c2d1671267f450d1de4882e3f703050a6d0bc98e0bac6efd85cf930590c8baad02e83a940bf18b3822e5bc23c3981897d8c572d7707f45489454520b8fa5aa120af382beb22bd5639ae3c0c7999ea2880018724085f84355918d75e87f90efb8a422d97b12ed800c137d1fc440580e4d233876f01c0e8c9fa0053d9481ef50cddcd212bec4de6a65cdea1779e65b69efa694fac8bd3239997a82410a7e517c25850bbc1889cbbab8a55a1ec3caba35c17f662a4f4f81ed27c590d21c4fed9f67c7af3a00e8b33ad0e2e9faf09df945996335388b5fd03bfb38059c4cd753e119fdb8a758a40d75d49884507ceac99018aedc0f5bc3f1244fc640abc5d2151f009e4a23f626e38f286e4a81de15fba4aa223ca8bd82a828352cdb0f751e3ff3a4a379b6f49ecdd92d5b49d582fb1a5c401f9ffb0c1c9946b962c60f7f45e7ce78b054ace51924d9f22da69484280b527d36805b22fd48e00cbe0fb2f560ffb1b164bd688b0bf7bd149f731e5bdf8695f5bb06e3150ed36320afada061f8c910c2d8c7d6e501eb13ce95b846ecaa1a4154671368066e43487c8d70c15e0c0a4bcf4788204724b10712e3cba60d92c3ae6ee4b770e98a53d2fc834e59cde24c421d22b733613256e21f685dbbf62f6746330be181b0e9d8fa0c5e750c25c809e08044e844419686eda4e0812e57297ad3e14699c453ecf2bd6a5395c8395d9c770cd8a08c3a7d93d70d43037c1f8a23ae1b02cf4cbe3f82fc57c40defe9bee390b181d188a86c6e536a2c35a0ede29b165549494c5d807c98b17e62c2a5cde2d11fffe103e3399ba1614587b7df0720857e5546095de48effa6a68d585cfb890f154f9d93c2164e1abe5540f3a9f866091ebc2e4c743779f543e43279af249a3397ddf69bee069a0b85066cd064fa1060e9884a9f47644733a822e8c4d591552c4b47ead11a3143a6e2604e375bfcaf924ce8b9c8a540680798a058b3269d817c5390be3383d70a5fe579a3139a26f19a655699a85070bff68224a6f13de57f3423061ea0468f543dc8f676eff28131f986143fb10173d0206826218baca9a5a059ed02b14e1ea7ab63c5725992f4925ef77302f0dbbc6bbb9d9e161fcb0c298b76ca3dd035727953df40befe8de2047df4e7ba5de879a76a8c70c8827840c4b5140df0a2f06bf6503136cedfac6f5efa7ffb0f3cc6d45eeb67a2f14c8af4262024c8783c304073b76df0276b6e589f333151f75b166b3e83479965b611e9eb0aad987323ea4111a7518cb9b474ca80da5236d802b7874c546e4b15eb164cc889113e342fb96b3e3a614eb76dece1e3d262cca30ccf63115064f21243985aad60f7095144d49dfe7ca60cbeb492ac3276375974d342573b2b0e931a050c6336b3722d2c7eaa3b838d8b3b6a939c5827d49c366e240e8ad7d0ca38b8d4fbfccd00400f3587d6b37ae20333cd2f1d70581484115eec3ba1f1a32fb21f3f3bdf36af80afa76422329e8a24fb5a0c4f33535d96584ceeba0d6c86b2554ce4c697c284c1dd2bfbf36f664c4a0d9e20abf214a5fbadd2448fe32961a4c6fe083c49e76bd21f874aba59ab6c2f6b1f10d6ada34123f315367cb23dcb7b7be0102a51e951b503daa0c784bfa9af7d3a5298adff4154f7e4d1a466dac225b44e5f82569ba0da3439bc3b5328ae99f503f4f236d146de57479214476ae4e0eea6136875f0f822006065221d7ed0a5a5e5bc3bfe64cc1c2555c57c4e934161d9856dd82ce0ca542df562dadc63c1327a647fff1cc4203cbdcc73e3f26e2caf74ff4024f184721b860788565231b930187013d1ab8f19e9fad8dac73eba13825ce7f3cc9fecaba54244e1c44601d61dd3c5b9652d7a9b061957f7d4e22820afcaed98f2cf677663b4f8927d0e4a357d28453f66f7914999008e2d6fc38fcf726b994bca51926d93fe5f2063368e8c26171f91fccea7deded50f63062514490a458aea1d00381a0c61c44aa8f6051d0b3a796ef32ecede396f61c2196eee4b1978ffb2925c62134f4599d53d9bb70bf8f493facee1511a9cea70ff90993e90518b418de91957f60f579477d288ffd8d5085a146c07a9224a195b76d161a0c5690b5bf7a527091164904940078df5e5ce1b8efa37590733002d30acea2730d10d47667bcbc8a6d55e71ec85de212ccf7a66e1eb2108c4e63fbf92d6ec67a396ac435c096e7f0b86233a3eac78c6bb61204110799fff16240519168638ff72106a38d8d21c9ce0ecc832980232586fb45c1a5d89f019a303add1d9071c54de156e36fd413c33f8d258ce8764e0e9a692033f9ab6bb2265177ef1eb9bc254da", "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"}) 02:00:47 executing program 2: ioctl$CAPI_REGISTER(0xffffffffffffffff, 0xc0104320, &(0x7f0000000000)={0x3}) [ 209.468999] audit: type=1400 audit(1569981646.902:44): avc: denied { read } for pid=7944 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 209.499513] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") unshare(0x24020400) pipe(&(0x7f0000000040)={0xffffffffffffffff}) sendfile(0xffffffffffffffff, r1, &(0x7f0000000140), 0x0) 02:00:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x90}, [@ldst={0x9, 0x0, 0xb, 0x52}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x4}, 0x1bc) 02:00:47 executing program 2: ioctl$CAPI_REGISTER(0xffffffffffffffff, 0xc0104320, &(0x7f0000000000)={0x3}) 02:00:47 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x6000, 0xa}}}, 0xb8}}, 0x0) 02:00:47 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040)=0x2, 0x4) [ 209.952054] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:47 executing program 2: ioctl$CAPI_REGISTER(0xffffffffffffffff, 0xc0104320, &(0x7f0000000000)={0x3}) 02:00:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x57) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0x7ff8, 0xe, 0x0, 0xfffffffffffffe2b) 02:00:47 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x3fffffff80000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x01\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0)={{}, {}, [{}]}, 0x2c, 0x0) fgetxattr(r0, &(0x7f0000000140)=@known='system.posix_acl_access\x00', 0x0, 0x3ac) socket$inet6(0xa, 0x4, 0x400) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x20200) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x174, r2, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x130, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x100, @ipv4={[], [], @remote}, 0x890}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x10001, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x96d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x991f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1bca}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xd4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x14050}, 0x20000480) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000380)={0x0, @bt={0xbfac, 0x8, 0x1, 0x3, 0x7, 0x0, 0x8, 0xffffffff, 0x1c00000, 0x100, 0xfffffc01, 0x7fffffff, 0x7f, 0x40}}) socket$caif_seqpacket(0x25, 0x5, 0x3) r3 = inotify_init() r4 = open(&(0x7f00000005c0)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x4000082) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e24, @broadcast}}}, 0x90) sendfile(r4, r4, &(0x7f0000000080)=0x2, 0xa198) 02:00:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f00000012c0)="1f000000010afffffd3b54c007110000f30501000b0007001a0000000000cf", 0x1f) 02:00:47 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") 02:00:47 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, &(0x7f0000000000)={0x3}) [ 210.340679] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 210.421833] audit: type=1400 audit(1569981647.992:45): avc: denied { name_connect } for pid=8040 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 02:00:48 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:48 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, &(0x7f0000000000)={0x3}) 02:00:48 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)="f5", 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r3 = epoll_create(0xe) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000040)) epoll_wait(r3, &(0x7f0000000100)=[{}], 0x2bb, 0xfffffffffffffffb) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 210.568467] audit: type=1400 audit(1569981648.042:46): avc: denied { create } for pid=8042 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 210.687348] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:48 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, &(0x7f0000000000)={0x3}) [ 210.723173] audit: type=1400 audit(1569981648.042:47): avc: denied { write } for pid=8042 comm="syz-executor.1" path="socket:[29199]" dev="sockfs" ino=29199 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 02:00:48 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:48 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0xc0104320, &(0x7f0000000000)={0x3}) 02:00:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYPTR64], 0x8) recvmmsg(r0, &(0x7f0000006540)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000640)=""/251, 0xfb}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40, 0x0) 02:00:48 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:48 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0xc0104320, &(0x7f0000000000)={0x3}) 02:00:48 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 02:00:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000040)={0x0, 0xffffffffffffff64, &(0x7f0000009ff0)=[{&(0x7f0000000080)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 02:00:48 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x3fffffff80000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x01\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0)={{}, {}, [{}]}, 0x2c, 0x0) fgetxattr(r0, &(0x7f0000000140)=@known='system.posix_acl_access\x00', 0x0, 0x3ac) socket$inet6(0xa, 0x4, 0x400) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x20200) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x174, r2, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x130, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x100, @ipv4={[], [], @remote}, 0x890}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x10001, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x96d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x991f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1bca}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xd4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x14050}, 0x20000480) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000380)={0x0, @bt={0xbfac, 0x8, 0x1, 0x3, 0x7, 0x0, 0x8, 0xffffffff, 0x1c00000, 0x100, 0xfffffc01, 0x7fffffff, 0x7f, 0x40}}) socket$caif_seqpacket(0x25, 0x5, 0x3) r3 = inotify_init() r4 = open(&(0x7f00000005c0)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x4000082) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e24, @broadcast}}}, 0x90) sendfile(r4, r4, &(0x7f0000000080)=0x2, 0xa198) 02:00:48 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 02:00:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) getsockopt$SO_COOKIE(r2, 0x1, 0x2b, &(0x7f0000000140), &(0x7f00000001c0)=0x8) 02:00:49 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0xc0104320, &(0x7f0000000000)={0x3}) 02:00:49 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:49 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000880)="24000000520007041dfffd946fa283000a200a0009000300001d85680c1ba3a20400ff7e280000001100ffffa116a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 02:00:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffe4b) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000540), 0x118) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 02:00:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x3fffffff80000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x01\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0)={{}, {}, [{}]}, 0x2c, 0x0) fgetxattr(r0, &(0x7f0000000140)=@known='system.posix_acl_access\x00', 0x0, 0x3ac) socket$inet6(0xa, 0x4, 0x400) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x20200) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x174, r2, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x130, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x100, @ipv4={[], [], @remote}, 0x890}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x10001, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x96d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x991f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1bca}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xd4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x14050}, 0x20000480) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000380)={0x0, @bt={0xbfac, 0x8, 0x1, 0x3, 0x7, 0x0, 0x8, 0xffffffff, 0x1c00000, 0x100, 0xfffffc01, 0x7fffffff, 0x7f, 0x40}}) socket$caif_seqpacket(0x25, 0x5, 0x3) r3 = inotify_init() r4 = open(&(0x7f00000005c0)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x4000082) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e24, @broadcast}}}, 0x90) sendfile(r4, r4, &(0x7f0000000080)=0x2, 0xa198) 02:00:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:49 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, 0x0) 02:00:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='mem\x00\x00\x00\x00\x00\x00\a\x13\x00'/258, 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xfebfffff) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) gettid() 02:00:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:49 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, 0x0) 02:00:49 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, 0x0) 02:00:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:49 executing program 4: r0 = socket$inet(0x10, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:50 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='mem\x00\x00\x00\x00\x00\x00\a\x13\x00'/258, 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xfebfffff) lstat(0x0, 0x0) 02:00:50 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, &(0x7f0000000000)) 02:00:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x3fffffff80000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x01\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0)={{}, {}, [{}]}, 0x2c, 0x0) fgetxattr(r0, &(0x7f0000000140)=@known='system.posix_acl_access\x00', 0x0, 0x3ac) socket$inet6(0xa, 0x4, 0x400) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x20200) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x174, r2, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x130, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x100, @ipv4={[], [], @remote}, 0x890}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x10001, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x96d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x991f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1bca}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xd4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x14050}, 0x20000480) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000380)={0x0, @bt={0xbfac, 0x8, 0x1, 0x3, 0x7, 0x0, 0x8, 0xffffffff, 0x1c00000, 0x100, 0xfffffc01, 0x7fffffff, 0x7f, 0x40}}) socket$caif_seqpacket(0x25, 0x5, 0x3) r3 = inotify_init() r4 = open(&(0x7f00000005c0)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x4000082) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e24, @broadcast}}}, 0x90) sendfile(r4, r4, &(0x7f0000000080)=0x2, 0xa198) 02:00:50 executing program 4: r0 = socket$inet(0x10, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:50 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, &(0x7f0000000000)) 02:00:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)={[{@nodatacow='nodatacow'}, {@check_int_data='check_int_data'}], [{@euid_gt={'euid>'}}, {@measure='measure'}]}) 02:00:50 executing program 4: r0 = socket$inet(0x10, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:50 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104320, &(0x7f0000000000)) 02:00:50 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 02:00:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) stat(0x0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0xff, 0x0, 0x0, 0x0, &(0x7f0000000d00)={[{@noautodefrag='noautodefrag'}, {@nodatacow='nodatacow'}, {@space_cache_v2='space_cache=v2'}], [{@euid_gt={'euid>', r0}}, {@subj_type={'subj_type', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner'}}]}) [ 213.118926] nla_parse: 4 callbacks suppressed [ 213.118936] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getrandom(0x0, 0x0, 0x3229bc461e7f5ad4) 02:00:51 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r2, 0x0, 0xfffffe55, 0x100100002) 02:00:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001e000102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008e60a00", @ANYRES32], 0x28}}, 0x0) 02:00:51 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000000)={0x7}, 0x7) r5 = socket$inet(0x2, 0x1, 0x3) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) getsockopt$EBT_SO_GET_INFO(r5, 0x0, 0x80, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x78) vmsplice(r1, &(0x7f0000000b40)=[{&(0x7f0000001a00)="d8", 0x1}], 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r4, 0x0, 0x10005, 0x0) 02:00:51 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 213.802955] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 213.820456] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 02:00:51 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x40000008}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000140)=0x10498042) [ 213.862981] audit: type=1400 audit(1569981651.422:48): avc: denied { map } for pid=8209 comm="syz-executor.1" path=2F6D656D66643AB3202864656C6574656429 dev="tmpfs" ino=30647 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 02:00:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000040)) 02:00:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x8, 0x0, &(0x7f0000ca5ffc)) [ 213.984466] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:51 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:51 executing program 0: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, &(0x7f0000000100)="0600", 0x2, 0x8002, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460000"], 0x6) 02:00:51 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$cgroup_int(r1, &(0x7f0000000180), 0x12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r3, r4, 0x0, 0x1) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000240)={'netdevsim0\x00', {0x2, 0x4e23, @multicast2}}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0xfb) syz_open_dev$loop(0x0, 0x0, 0x0) 02:00:51 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="240000005a001f00ff03f4f9002304000a04f5110800010002010002080002", 0x1f) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) [ 214.229060] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 214.365586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8260 comm=syz-executor.2 [ 214.410315] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8260 comm=syz-executor.2 [ 214.428647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8260 comm=syz-executor.2 [ 214.451175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8260 comm=syz-executor.2 [ 214.465828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8260 comm=syz-executor.2 [ 214.479458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8260 comm=syz-executor.2 [ 214.492593] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8260 comm=syz-executor.2 02:00:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x8923, &(0x7f0000000700)={'eql:\xb3\x87\x00\x00\x00\x00\x00\x00\x00\x02\x00', @ifru_flags=0x3301}) 02:00:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x6, &(0x7f0000000140)=0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x1, 0x0, @ipv4={[], [], @remote}}, 0x26) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000240)="e5", 0x1}], 0x1) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) [ 214.505823] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8260 comm=syz-executor.2 [ 214.519118] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8260 comm=syz-executor.2 [ 214.532133] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8260 comm=syz-executor.2 [ 214.566844] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 214.622954] : renamed from eql 02:00:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x8000000006007, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) 02:00:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 214.659254] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) fchdir(r0) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r2, 0x0, 0xfffffe55, 0x100100002) 02:00:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) [ 214.810372] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:52 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$cgroup_int(r1, &(0x7f0000000180), 0x12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f00000001c0)=@md5={0x1, "afbf84ce3f892b5b238f02114c1d1c7c"}, 0x11, 0x2) socket$key(0xf, 0x3, 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r3, r4, 0x0, 0x1) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000240)={'netdevsim0\x00', {0x2, 0x4e23, @multicast2}}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) getpgrp(0x0) ioctl$int_in(r5, 0x5452, &(0x7f0000000040)=0xfb) syz_open_dev$loop(0x0, 0x0, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) 02:00:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6653070000003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f90bba001b50c0da6218a8106df2858ec973328e5a2c078a3fe3b52020203517e25ee74e82ba80a0fa881e689f7615baf78f08ea33bcb860d6a0b61193d4a1cb622431d42fee5e91531bfdfe5cb19ff15d6d891a92efa823a3c231ea82fdf0e7fcf567bf50600a243422daa960ab9f4b41d535a4e723362f56de8c859fa668b046005fc1e44e4e4b7966c8bbd036be5e23eb4b", 0xea}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 02:00:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) 02:00:52 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000240)={'netdevsim0\x00', {0x2, 0x4e23, @multicast2}}) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0xfb) [ 215.134415] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 215.160531] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:52 executing program 0: syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x1) unlink(&(0x7f0000000000)='./file0\x00') 02:00:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 215.310307] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:00:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:53 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:53 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:53 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r0) chroot(&(0x7f0000000100)='./bus\x00') 02:00:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x14, r1, 0x701, 0x0, 0x0, {0xd, 0x0, 0xfffffffffffff000}}, 0x14}}, 0x0) 02:00:55 executing program 0: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000007c0)='tmpfs\x00\xf6\f_\x10b\xc6\xb3\x9eMtO\xabM\xd9\x00\x05-\xe5r\n\xb1\xe0O\xe4M\xc9r\xcb\xfa\xef', 0x10018, 0x0) chdir(&(0x7f0000000440)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) 02:00:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:55 executing program 4: socket$inet(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:55 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f0000000480)="90ec80a6930c60f627825b60f9eaa3579f155fa74b105edd561a45dc579b3b9a8913692d474861fcb130fd974ca12971509ca75c2f799ac1afce70113d0632f59e850fd0da255b979afd61fbf97d5fa889dd09cfa343e95326c3caaa3bca47ac9a0b3a0a98588ffc1103c5b197d753929d48756b8221cb751d811b9963ef5144e2", 0x81, 0x0, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000500)=""/246) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000180)=""/246) 02:00:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) fcntl$getflags(r0, 0x1) 02:00:55 executing program 4: socket$inet(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:55 executing program 2: r0 = socket$inet6(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="5500000018007f09480500b2a4a280930206030000a843096c2623692500090009000102bd68a3c728f1c46b8831afdc1338d54400fd9b84136ef75afb83de448daa178304005f0634fbc59db1bdf415cec97227c4", 0x55}], 0x1, 0x0, 0x0, 0x46020000}, 0x0) 02:00:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x14, r1, 0x701, 0x0, 0x0, {0x10, 0x0, 0xfffffffffffff000}}, 0x14}}, 0x0) 02:00:55 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000440)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') umount2(&(0x7f00000005c0)='./file0/../file0/file0\x00', 0x80000000002) fchdir(r0) 02:00:56 executing program 4: socket$inet(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:00:56 executing program 0: shmget(0x3, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 02:00:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:56 executing program 2: shmget(0x3, 0x3000, 0x652, &(0x7f0000ffd000/0x3000)=nil) 02:00:56 executing program 1: 02:00:56 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, 0x0, 0x0) 02:00:56 executing program 3: 02:00:56 executing program 0: 02:00:56 executing program 2: 02:00:56 executing program 1: 02:00:56 executing program 3: 02:00:56 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, 0x0, 0x0) 02:00:56 executing program 0: 02:00:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:56 executing program 2: 02:00:56 executing program 1: 02:00:56 executing program 3: 02:00:56 executing program 0: 02:00:56 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, 0x0, 0x0) 02:00:56 executing program 3: 02:00:56 executing program 2: 02:00:56 executing program 1: 02:00:56 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 02:00:56 executing program 0: 02:00:56 executing program 3: 02:00:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:56 executing program 1: 02:00:56 executing program 2: 02:00:56 executing program 3: 02:00:56 executing program 0: 02:00:56 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 02:00:56 executing program 2: 02:00:57 executing program 0: 02:00:57 executing program 1: 02:00:57 executing program 3: 02:00:57 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 02:00:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:57 executing program 0: 02:00:57 executing program 2: 02:00:57 executing program 3: 02:00:57 executing program 1: 02:00:57 executing program 0: 02:00:57 executing program 2: 02:00:57 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)}, 0x0) 02:00:57 executing program 1: 02:00:57 executing program 3: 02:00:57 executing program 2: 02:00:57 executing program 0: 02:00:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:57 executing program 1: 02:00:57 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)}, 0x0) 02:00:57 executing program 3: 02:00:57 executing program 0: 02:00:57 executing program 2: 02:00:57 executing program 1: 02:00:57 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)}, 0x0) 02:00:57 executing program 3: 02:00:57 executing program 0: 02:00:57 executing program 2: 02:00:57 executing program 1: 02:00:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:57 executing program 3: 02:00:57 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}, 0x0) 02:00:57 executing program 0: 02:00:58 executing program 2: 02:00:58 executing program 1: 02:00:58 executing program 3: 02:00:58 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}, 0x0) 02:00:58 executing program 0: 02:00:58 executing program 0: 02:00:58 executing program 2: 02:00:58 executing program 3: 02:00:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:58 executing program 1: 02:00:58 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}, 0x0) 02:00:58 executing program 0: 02:00:58 executing program 3: 02:00:58 executing program 2: 02:00:58 executing program 1: 02:00:58 executing program 0: 02:00:58 executing program 3: 02:00:58 executing program 2: 02:00:58 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)}], 0x1}, 0x0) 02:00:58 executing program 1: 02:00:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:58 executing program 0: 02:00:58 executing program 3: 02:00:58 executing program 2: 02:00:58 executing program 1: 02:00:58 executing program 0: 02:00:58 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)}], 0x1}, 0x0) 02:00:58 executing program 3: 02:00:58 executing program 2: 02:00:58 executing program 1: 02:00:58 executing program 3: 02:00:59 executing program 2: 02:00:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:59 executing program 0: 02:00:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)}], 0x1}, 0x0) 02:00:59 executing program 1: semget(0x3, 0x0, 0x61) 02:00:59 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) 02:00:59 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f00000011c0)='@', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 02:00:59 executing program 0: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f0000000c80)={0x1, "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"}, 0x44b, 0x800) msgrcv(r0, &(0x7f0000000000)={0x0, ""/202}, 0xd2, 0x2, 0x800) 02:00:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sysfs$1(0x1, &(0x7f0000000000)='selinux)eth1security\x00') 02:00:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e2800", 0x26}], 0x1}, 0x0) 02:00:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x1aecbb84d93c5313) 02:00:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:00:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x20, r1, 0x701, 0x0, 0x0, {0x13, 0x0, 0xfffffffffffff000}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) futex(0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0) 02:00:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e2800", 0x26}], 0x1}, 0x0) 02:00:59 executing program 0: socket$kcm(0x2, 0x20000000002, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x10, 0x0, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0xfff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8001, 0x40, 0x1ff, 0x0, 0x0, 0xff, 0x400, 0x3ff, 0x1000, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x7, 0x2, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x5, 0xff, 0x0, 0x6}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) gettid() write$cgroup_subtree(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 02:00:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:00:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e2800", 0x26}], 0x1}, 0x0) 02:00:59 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000400)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) keyctl$get_persistent(0x16, 0x0, r0) 02:00:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:59 executing program 2: r0 = socket$inet6(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="5500000018007f09480500b2a4a280930206030000a843096c2623692500080009000102bd68a3c728f1c46b8831afdc1338d54400fd9b84136ef75afb83de448daa178304005f0634fbc59db1bdf415cec97227c4", 0x55}], 0x1, 0x0, 0x0, 0x46020000}, 0x0) 02:00:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:00:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020", 0x39}], 0x1}, 0x0) 02:00:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:00:59 executing program 3: move_pages(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000ffb000/0x3000)=nil], &(0x7f0000000080)=[0x401], 0x0, 0x0) 02:00:59 executing program 2: mknod(&(0x7f0000000340)='./bus\x00', 0x3a0914c44f7b802d, 0x501) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000140)=0x7) 02:00:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:00 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:00 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020", 0x39}], 0x1}, 0x0) 02:01:00 executing program 3: mknod(&(0x7f0000000340)='./bus\x00', 0x3a0914c44f7b802d, 0x501) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10005, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000140)=0x7) 02:01:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x6, &(0x7f0000000140)=0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x1, 0x0, @ipv4={[], [], @remote}}, 0x26) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb}, 0x3c) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 02:01:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:00 executing program 0: socket$kcm(0x2, 0x20000000002, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x10, 0x0, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0xfff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8001, 0x40, 0x1ff, 0x0, 0x0, 0xff, 0x400, 0x3ff, 0x1000, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x7, 0x2, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x5, 0xff, 0x0, 0x6}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) gettid() write$cgroup_subtree(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 02:01:00 executing program 3: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x20000008) symlinkat(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0/file0\x00') 02:01:00 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020", 0x39}], 0x1}, 0x0) 02:01:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:00 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:00 executing program 2: r0 = syz_open_dev$cec(0x0, 0x1, 0x2) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000300)={0x28, 0x0, 0x0, @hyper}, 0xfffffffffffffffa, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) timer_getoverrun(0x0) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000100)) fstat(0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000180)={@empty}, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 02:01:00 executing program 3: move_pages(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000ffb000/0x3000)=nil], 0x0, &(0x7f00000000c0), 0x0) 02:01:00 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d82", 0x43}], 0x1}, 0x0) 02:01:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:00 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:00 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d82", 0x43}], 0x1}, 0x0) 02:01:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') sendfile(r3, r4, 0x0, 0x1) 02:01:01 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) dup3(r0, 0xffffffffffffffff, 0x0) inotify_init1(0x800) accept(0xffffffffffffffff, &(0x7f0000000800)=@nfc, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000080)=[{0x514a, 0x7, 0x1, 0x3}]}, 0x10) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$BLKROSET(r3, 0x125d, &(0x7f00000000c0)=0x101) openat(0xffffffffffffff9c, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x6cb568052978e50d, 0x0) fcntl$addseals(r1, 0x409, 0x4) r4 = memfd_create(&(0x7f0000000040)='Mq\x00'/12, 0x0) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="7f45ed4402dbb3bbaf469a8df11b94930006000000000000c4b4000300"], 0x1d) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) vmsplice(r4, &(0x7f0000000740)=[{&(0x7f0000000540)="08b1f8b87a4e715d86fd541b", 0xc}, {&(0x7f0000000700)="0eb91aa687b2fc3e72", 0x9}], 0x2, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000100)={0x291, &(0x7f0000000b80)=[{}, {}, {}, {}, {}]}) unlink(&(0x7f0000000000)='./file0\x00') syz_open_dev$loop(0x0, 0x10000, 0x0) 02:01:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:01 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d82", 0x43}], 0x1}, 0x0) 02:01:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:01 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 02:01:01 executing program 2: r0 = syz_open_dev$cec(0x0, 0x1, 0x2) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000300)={0x28, 0x0, 0x0, @hyper}, 0xfffffffffffffffa, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) timer_getoverrun(0x0) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000100)) fstat(0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000180)={@empty}, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 02:01:01 executing program 1: setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:01 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, 0x0) r1 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r1) creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 02:01:01 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 02:01:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:01 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 02:01:02 executing program 0: 02:01:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:02 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:02 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 02:01:02 executing program 2: creat(0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000027c0)={&(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_retopts={{0x10}}], 0x10}, 0x0) 02:01:02 executing program 1: setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:02 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 02:01:02 executing program 0: 02:01:02 executing program 1: setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:02 executing program 2: 02:01:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:02 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) [ 224.645383] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 635427838)! 02:01:02 executing program 0: 02:01:02 executing program 2: [ 224.736000] EXT4-fs (loop3): group descriptors corrupted! 02:01:02 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:02 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:02 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 02:01:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:02 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 02:01:02 executing program 2: 02:01:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:02 executing program 2: 02:01:02 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) 02:01:02 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 225.097845] protocol 88fb is buggy, dev hsr_slave_0 [ 225.103208] protocol 88fb is buggy, dev hsr_slave_1 [ 225.123377] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 635427838)! 02:01:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:02 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) [ 225.184531] EXT4-fs (loop3): group descriptors corrupted! 02:01:02 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:02 executing program 2: 02:01:02 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 225.337528] protocol 88fb is buggy, dev hsr_slave_0 [ 225.342681] protocol 88fb is buggy, dev hsr_slave_1 02:01:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) [ 225.524528] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 635427838)! [ 225.537869] EXT4-fs (loop3): group descriptors corrupted! 02:01:03 executing program 0: 02:01:03 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a1003001f00000903000800080017c00000ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) 02:01:03 executing program 2: 02:01:03 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:03 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:03 executing program 2: 02:01:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:03 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:03 executing program 0: 02:01:03 executing program 4: 02:01:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) [ 226.093856] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 635427838)! 02:01:03 executing program 2: 02:01:03 executing program 4: [ 226.152483] EXT4-fs (loop3): group descriptors corrupted! 02:01:03 executing program 0: 02:01:03 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:03 executing program 4: 02:01:03 executing program 2: 02:01:04 executing program 4: 02:01:04 executing program 0: 02:01:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:04 executing program 2: 02:01:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 226.554530] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 02:01:04 executing program 0: [ 226.619346] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 02:01:04 executing program 2: 02:01:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) [ 226.671501] EXT4-fs (loop3): group descriptors corrupted! 02:01:04 executing program 4: 02:01:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:04 executing program 0: 02:01:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:04 executing program 2: 02:01:04 executing program 4: 02:01:04 executing program 0: 02:01:04 executing program 2: 02:01:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:04 executing program 4: [ 227.057885] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 02:01:04 executing program 0: [ 227.140550] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 227.203938] EXT4-fs (loop3): group descriptors corrupted! 02:01:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:04 executing program 2: 02:01:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0), 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:04 executing program 4: 02:01:04 executing program 0: 02:01:05 executing program 4: 02:01:05 executing program 2: 02:01:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:05 executing program 0: 02:01:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0), 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 227.521514] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 02:01:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) [ 227.598322] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 227.639499] EXT4-fs (loop3): group descriptors corrupted! 02:01:05 executing program 2: 02:01:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0), 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:05 executing program 4: 02:01:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:05 executing program 0: 02:01:05 executing program 3: bind$netlink(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:05 executing program 4: 02:01:05 executing program 0: 02:01:05 executing program 2: 02:01:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 227.988253] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 02:01:05 executing program 2: 02:01:05 executing program 0: 02:01:05 executing program 4: [ 228.034915] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 02:01:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) [ 228.108914] EXT4-fs (loop3): group descriptors corrupted! 02:01:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:05 executing program 4: 02:01:05 executing program 2: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r2, 0x0, 0xfffffe55, 0x100100002) 02:01:05 executing program 0: 02:01:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:05 executing program 4: 02:01:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:06 executing program 0: 02:01:06 executing program 2: 02:01:06 executing program 4: 02:01:06 executing program 3: bind$netlink(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:06 executing program 2: 02:01:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:06 executing program 0: 02:01:06 executing program 4: 02:01:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:06 executing program 2: [ 228.640342] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 228.657630] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 02:01:06 executing program 4: 02:01:06 executing program 0: [ 228.734818] EXT4-fs (loop3): group descriptors corrupted! 02:01:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:06 executing program 2: 02:01:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:06 executing program 3: bind$netlink(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:06 executing program 4: 02:01:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:06 executing program 2: 02:01:06 executing program 0: 02:01:06 executing program 4: [ 229.082557] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 02:01:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) [ 229.126731] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 02:01:06 executing program 2: 02:01:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:06 executing program 4: [ 229.171682] EXT4-fs (loop3): group descriptors corrupted! 02:01:06 executing program 0: 02:01:06 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:06 executing program 2: 02:01:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09), 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:06 executing program 4: 02:01:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:07 executing program 4: 02:01:07 executing program 2: [ 229.537365] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 02:01:07 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240020005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:07 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09), 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) [ 229.581716] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 229.607664] EXT4-fs (loop3): group descriptors corrupted! 02:01:07 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000400043ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) [ 229.668111] sg_write: data in/out 2097152/1 bytes for SCSI command 0xe2-- guessing data in; [ 229.668111] program syz-executor.0 not setting count and/or reply_len properly 02:01:07 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000), 0xe) 02:01:07 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:07 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) 02:01:07 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09), 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) fcntl$setstatus(r0, 0x4, 0x2002) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:01:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:07 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, 0x0, 0x0) 02:01:07 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) [ 229.996823] sg_write: data in/out 4194304/1 bytes for SCSI command 0xe2-- guessing data in; [ 229.996823] program syz-executor.2 not setting count and/or reply_len properly [ 230.028994] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 02:01:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) [ 230.078912] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 230.114093] EXT4-fs (loop3): group descriptors corrupted! 02:01:07 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, 0x0, 0x0) 02:01:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 230.233716] sg_write: data in/out 4194304/1 bytes for SCSI command 0xe2-- guessing data in; [ 230.233716] program syz-executor.2 not setting count and/or reply_len properly 02:01:07 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0), 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb32, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4d4, 0x400}], 0x1, 0x0) 02:01:07 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, 0x0, 0x0) 02:01:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x6c}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) 02:01:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) [ 230.506154] audit: type=1326 audit(1569981668.065:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9248 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c86a code=0xffff0000 02:01:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 230.576570] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 230.590992] sg_write: data in/out 4194304/1 bytes for SCSI command 0xe2-- guessing data in; [ 230.590992] program syz-executor.2 not setting count and/or reply_len properly [ 230.612440] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 230.632170] EXT4-fs (loop3): group descriptors corrupted! 02:01:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 02:01:08 executing program 1: clone(0x304200, &(0x7f0000000240), 0x0, 0x0, 0x0) 02:01:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:08 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 02:01:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 02:01:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) [ 230.868163] sg_write: data in/out 4194304/1 bytes for SCSI command 0xe2-- guessing data in; [ 230.868163] program syz-executor.2 not setting count and/or reply_len properly 02:01:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') sendfile(r2, r3, 0x0, 0x1) 02:01:08 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 02:01:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) 02:01:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r3, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5"]}, 0x48}}, 0x0) 02:01:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:08 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:08 executing program 4: syz_open_dev$cec(0x0, 0x1, 0x2) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 02:01:08 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 02:01:08 executing program 1: r0 = syz_open_dev$cec(0x0, 0x1, 0x2) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000240)) fstat(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x7fff) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 231.283636] audit: type=1326 audit(1569981668.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9248 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c86a code=0xffff0000 02:01:09 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) 02:01:09 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 02:01:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="e7"], 0x1) 02:01:09 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x40) 02:01:09 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 02:01:09 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="e7"], 0x1) 02:01:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) unshare(0x24060400) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000780)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779a05c5c5a09000000ecf323c935ba26eab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc082b7bcdec844f667da0860700000000000000000000000000000000ebc53db0f533e8d15d34bf", 0x82, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/192, 0xc0}], 0x1}, 0x0) r4 = gettid() recvmmsg(r0, &(0x7f0000000ac0), 0x167, 0x0, 0x0) tkill(r4, 0x14) 02:01:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x40) 02:01:09 executing program 1: mmap$usbfs(&(0x7f0000ffd000/0x1000)=nil, 0x4000, 0x0, 0x8072, 0xffffffffffffffff, 0x0) mmap$usbfs(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x46033, 0xffffffffffffffff, 0x0) mmap$usbfs(&(0x7f0000c00000/0x400000)=nil, 0x6400000, 0x0, 0x46033, 0xffffffffffffffff, 0x0) 02:01:09 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 02:01:09 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x40) 02:01:09 executing program 4: 02:01:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="e7"], 0x1) [ 232.196158] audit: type=1400 audit(1569981669.755:51): avc: denied { map } for pid=9380 comm="syz-executor.1" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=35851 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 02:01:09 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) 02:01:09 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:09 executing program 1: 02:01:09 executing program 4: [ 232.381180] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="e7"], 0x1) 02:01:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100}, 0x40) 02:01:10 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) 02:01:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:10 executing program 4: 02:01:10 executing program 1: 02:01:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:10 executing program 4: 02:01:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100}, 0x40) [ 232.693568] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:10 executing program 1: 02:01:10 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) 02:01:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:10 executing program 4: 02:01:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100}, 0x40) 02:01:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:10 executing program 1: 02:01:10 executing program 4: [ 232.962134] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:10 executing program 2: syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:10 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x1, 0x0) 02:01:10 executing program 1: 02:01:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0", 0x0, 0x100}, 0x40) 02:01:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:10 executing program 4: 02:01:10 executing program 1: 02:01:10 executing program 2: syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) [ 233.268002] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:10 executing program 4: 02:01:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0", 0x0, 0x100}, 0x40) 02:01:10 executing program 1: 02:01:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:11 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x1, 0x0) 02:01:11 executing program 4: 02:01:11 executing program 1: 02:01:11 executing program 2: syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83cf8", 0x31}], 0x1) 02:01:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0", 0x0, 0x100}, 0x40) 02:01:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:11 executing program 4: 02:01:11 executing program 1: [ 233.596653] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2", 0x0, 0x100}, 0x40) 02:01:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, 0x0, 0x0) 02:01:11 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x1, 0x0) 02:01:11 executing program 4: 02:01:11 executing program 1: 02:01:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2", 0x0, 0x100}, 0x40) 02:01:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 233.897588] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:11 executing program 4: 02:01:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, 0x0, 0x0) 02:01:11 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x1, 0x0) 02:01:11 executing program 1: 02:01:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2", 0x0, 0x100}, 0x40) 02:01:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, 0x0, 0x0) 02:01:11 executing program 4: [ 234.147799] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:11 executing program 1: 02:01:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3a, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901010803", 0x0, 0x100}, 0x40) 02:01:11 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x1, 0x0) 02:01:11 executing program 4: 02:01:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000), 0x0) 02:01:12 executing program 1: 02:01:12 executing program 4: [ 234.409558] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:12 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x1, 0x0) 02:01:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:12 executing program 1: 02:01:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000), 0x0) 02:01:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3a, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901010803", 0x0, 0x100}, 0x40) 02:01:12 executing program 4: [ 234.655295] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x3d}, {0x6, 0x0, 0x0, 0xffffffff7fffffff}]}) 02:01:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3a, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901010803", 0x0, 0x100}, 0x40) 02:01:12 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x1, 0x0) 02:01:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000), 0x0) 02:01:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="5500000018007f09480500b2a4a280930206030000a843096c2623692500060009000102bd68a3c728f1c46b8831afdc1338d54400fd9b84136ef75afb83de448daa178304005f0634fbc59db1bdf415cec97227c4", 0x55}], 0x1, 0x0, 0x0, 0x46020000}, 0x0) 02:01:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:12 executing program 1: ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x10001, 0x8000}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 234.916026] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 02:01:12 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x1, 0x0) 02:01:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3e, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da19244", 0x0, 0x100}, 0x40) [ 235.070786] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 02:01:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 02:01:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="5500000018007f09480500b2a4a280930206030000a843096c2623692500060009000102bd68a3c728f1c46b8831afdc1338d54400fd9b84136ef75afb83de448daa178304005f0634fbc59db1bdf415cec97227c4", 0x55}], 0x1, 0x0, 0x0, 0x46020000}, 0x0) [ 235.192340] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3e, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da19244", 0x0, 0x100}, 0x40) 02:01:12 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x1, 0x0) 02:01:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) [ 235.349403] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 02:01:13 executing program 0: setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x240002, 0x2, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) [ 235.519347] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:13 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/icmp6\x00') unshare(0x28020400) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f00000000c0)=':md5sum\x00', 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:01:13 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001", 0x1d, 0x400}], 0x1, 0x0) 02:01:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3e, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da19244", 0x0, 0x100}, 0x40) 02:01:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)}], 0x1) 02:01:13 executing program 0: setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x9821, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000440)={0x0, 0x0, 0x2080, {}, [], "12ec107c588333300f0efb9376a31de27ff749fa4f5927e01256d4696a38a1a3f759adaa52c6ef1c6cbde033b4c252281620e3a8455c5dee4ee47af8cdecd4d219f174d4d71134967e7d2f13615d2fda3c95b26c26f2c6e342704ddb7e70a01628d4178cfa5370d4f24842d08ebcef47f4128bbc67db0f868428fe69441faeb204526fc110d0d5311b3498e881debebee9c3fd4e6694ba892bb743c53176d27f39b1e724898d1ad1f0d80dcf05b4aba08378b54b64f70eb9fb85bbe7a3ce7844682a149a8ba83dea66f6bc9b173151e7cbd5707571865b7f062973873ec155dfa890671f1936969991d68458b218ae31986ef07f0829ace36be0b898bed8eb7385102fd20cd25f15fb67e94c8acd61587241c8025f213943405db1ace7dc2d17194fa4895e064c44ac888f816fae949848c3548f25e35f24fcadeb15caaf3114a452b983b405ae9bf5a307d6028f1da76024e36768c48be8ab02966acf1ba85aeaea24b7ba297ebd9e142327d9c20c6cad34b0994ad9292b708bf7dc7d1e886022ac3d45074dfeb078784f39cc5223117f52fed6067156fab290456b028d8f2b47a3a5ae91385fd62b6e57f651fd5aad0095484d788ce9793d9e51c6494aa0dceeccc392a6c7fb38683b93aa655f3bb4cc5bf004d21bf45b6b14b1c728c815e70bf7875032d4b47f65469af3392fbd92468a93ff4ec057972e2dfcf4a74b4ab23e7ea880c01ec0a7a282a77a1d1e2907452079651b770d2e85f7209cd6d9201dc6c393530a34097b3e9d65fc6276a0bf6a37d0b368ebc330cea896cf7b629421029e5c73160d8d1553d0724a3cf51bb442bacf67ad1f9ff654902b812d29542f9470a13ceb9bf59af7a6960c0eecfe285133e57311e10a9114727e8d607a6603c65bde036039f696e951bfac9ecf469e80055482a2653b4c95f3711d26a1243c03f326d6e73b07d478e1a3a6c83267cbc0f90fcba0571ba146794ad666f1138281172142a1e961dcc1806edf82399194ee7a892a6eb54d806067a5d8c9131140073c1d01d4a84d0f8f04fd32a6e686ffaa0846eee5ed5de037a80ccb6a0caef6432daf1c8d6991476f3bfd02a953ebce2af3ca0c78ced7bb2c5e6a4a489563923259bb050e59627424419238cd27c0ecf2373804da66b30fa5b124a4bdb755494fd257eaeafe845407530148e82a932d90f31d649cc3f0f9f60b6931222869a0c4728ddc390c349a5e3eddb64e8e81c7715c72005d24df36f7a8527de93b041877f5bd437a5d26b619a3f3ed3cf413aec61aea03e6c05df344d466895bd0e4ebf03a890887510030f09dc973ad43488561e65b8e9a7224b2d60e4c72c2718c51b6e4b1caf51f15b9b56aa02399725dc1b632b16c1ccb14d267b95cecfd0a99b3412bbf91786c66c6f8b0a0712aec259192061223732aa2ffa0d46fffbf3512cea250b6d72644c3894e8e9e5dc9c4b9af8b8b7b28a977e3cfe6c001474c4a2fda9bee8670d473073ff6c008d0aa844a30ed235e8d2102b4cd89d509bb00e30fcce37a886bd88fe5195640a45dd47b499bd3e3d1a6aa4196b2820348a99332dcd2ab3974dd825c6a937c9e85864f4b2faec13ed8a953473bb9927edab3906fab488b04b07d3567a01dd35da5b5f389fa6e5048a9252f3e8ef55fb0736e50d016164d238d011174d6b1c4b71ea27f778426a6c0a13728274755c11c1ef79d0272dcf50223462a900d1b596d1b5a5fc099dd859b58c2acffb0292c33f7009dff76241c953512a51361fd232665fabb44a919b995ae62f6b3b8fcb96acdc6134f292885b9dcf95f7bff1ae1437b38322701d3c7b21b572f42e509029864044fdd473bc7adce1c110a53a54f54a08480dddf1d542419f42621f467a79b98d1e4bcc4516c0a2432356e1244d28607afa287e2bad529696d58366f1dc1620b0e6983718dc983005f0f3c8805ee8006f1fc7f0107c67646ecac591897f1e6e9cd1cb2de62087c44e603b6bc5ffb25b7a8db515b9e7fc3088ae3e87645cff702636c49d34a41a7329324b393954860f85c98e4fda7096b882ac4026eccbc2ee841cae8184998339ddb445dc2a5939fd26d851ec9e3396802806b0ac604c4acea049663d811d342dfd31fd3b6cacd1f2134f5b1ae3d3e07991cd20306a5d289b0c1cba02f9a54439e36b3f7e4a89983de7a0a5bd48a0fe048776c832ed6292db63daabe79b8b8787d117744fc9b73a3bcfd77ad9efd6d7919eae825dcbb5eab419e8e1990204914b591618ce7ec17470dc3be094d57587f2e975dd86db2194186c7e5b455850a8c018fb21bbfbeab60c0d4d32232fd1844aba9d7f30b6ec6efc7523b2b599cf54de61a60b3990e57fab7935166e2cb85660a65e9b784453405e0b78cea1d3e18072ee119c901cc857455d6deb6e5a62e134ddcd4bb66159991098c8f75b6a9e07d480b872f95ea6b41b4378dfa97d98870dcf1227f1754246e5363dc316754e8e9e638e80b2899626961de8e91d228597c680e12adc8157b418e71040cc7fb61cc08aa91a8b4cb5cf02c303850c6d55af67ac75dfa4da6c5b87a7b7c7c38ca8c32277307799f8743448815fe439cfe54113b2910276e28cf6ba45afdedd1ba93a28bbffe4923ffe2c4a6fce237334ab6f876ac451988a057e50e2012e832d21134798e125cf34ef69579b8eee7871d3726e330d29825c25610640fb11b5ef9abe661bcb42a985ac3677447301b49adc00e420d3b541b41aaf0cb9b5016b84fd6a9993fd3fcfc56cb3cb4823f6ea5f2688275861788e6c32f9183bf594f43af292f725d195dc155969f82060b907c7c1f276af5659fc687d0540ed1ea6b5d9f56cc57dfa7dede1379db172eb437cfe718f174c9215e51f79164ccce2861dc13d08c0f8dc2a5431176739d265602b3d066e9f7cdadff7571f94432f71851995f09f8d1be241fa0e1459825009a466071338fb3937dcd7e63332e491e79d7556f4133e45bfcc7f23b48f09f990bab2a10c22cbf5ec305eff5899385719d12d1888d542e2aa329c222233560187ce67242b359ace51240321c7bacd2247668a03f96b4375a75ce349965130edcbd5019cb72c5d149e291e6f60605050261c13b93c176a0a39a23413388b7b38aa49d6e11ce0541f61841ae159851049a3695f3af7f691128a2d7479223f06657e28b4d5cf4d5d84a5024cc88445df2be31642c71c90641cba9ffae1e8187e86038cd37e206603141972b2313185993a319d176e8ef47d28e93232bd76ce73aaa850e080a261d69e44829bbdca27f002c9b0cac934eaff57ffc43e9e0b2ae7cbff2af2a21d0e6e9f33d3c73c45098fb0231019b495b19c79b9fa567e0cd950dd7af4c00afebaa42f608c5dd6d7cd662a4a5d3a78bddcbd7500678d04be6b6c3bec163e82c7e071b8b25f1d087da9eb0dc95b4b0ff74dbccb35fb1c8766104c2d1671267f450d1de4882e3f703050a6d0bc98e0bac6efd85cf930590c8baad02e83a940bf18b3822e5bc23c3981897d8c572d7707f45489454520b8fa5aa120af382beb22bd5639ae3c0c7999ea2880018724085f84355918d75e87f90efb8a422d97b12ed800c137d1fc440580e4d233876f01c0e8c9fa0053d9481ef50cddcd212bec4de6a65cdea1779e65b69efa694fac8bd3239997a82410a7e517c25850bbc1889cbbab8a55a1ec3caba35c17f662a4f4f81ed27c590d21c4fed9f67c7af3a00e8b33ad0e2e9faf09df945996335388b5fd03bfb38059c4cd753e119fdb8a758a40d75d49884507ceac99018aedc0f5bc3f1244fc640abc5d2151f009e4a23f626e38f286e4a81de15fba4aa223ca8bd82a828352cdb0f751e3ff3a4a379b6f49ecdd92d5b49d582fb1a5c401f9ffb0c1c9946b962c60f7f45e7ce78b054ace51924d9f22da69484280b527d36805b22fd48e00cbe0fb2f560ffb1b164bd688b0bf7bd149f731e5bdf8695f5bb06e3150ed36320afada061f8c910c2d8c7d6e501eb13ce95b846ecaa1a4154671368066e43487c8d70c15e0c0a4bcf4788204724b10712e3cba60d92c3ae6ee4b770e98a53d2fc834e59cde24c421d22b733613256e21f685dbbf62f6746330be181b0e9d8fa0c5e750c25c809e08044e844419686eda4e0812e57297ad3e14699c453ecf2bd6a5395c8395d9c770cd8a08c3a7d93d70d43037c1f8a23ae1b02cf4cbe3f82fc57c40defe9bee390b181d188a86c6e536a2c35a0ede29b165549494c5d807c98b17e62c2a5cde2d11fffe103e3399ba1614587b7df0720857e5546095de48effa6a68d585cfb890f154f9d93c2164e1abe5540f3a9f866091ebc2e4c743779f543e43279af249a3397ddf69bee069a0b85066cd064fa1060e9884a9f47644733a822e8c4d591552c4b47ead11a3143a6e2604e375bfcaf924ce8b9c8a540680798a058b3269d817c5390be3383d70a5fe579a3139a26f19a655699a85070bff68224a6f13de57f3423061ea0468f543dc8f676eff28131f986143fb10173d0206826218baca9a5a059ed02b14e1ea7ab63c5725992f4925ef77302f0dbbc6bbb9d9e161fcb0c298b76ca3dd035727953df40befe8de2047df4e7ba5de879a76a8c70c8827840c4b5140df0a2f06bf6503136cedfac6f5efa7ffb0f3cc6d45eeb67a2f14c8af4262024c8783c304073b76df0276b6e589f333151f75b166b3e83479965b611e9eb0aad987323ea4111a7518cb9b474ca80da5236d802b7874c546e4b15eb164cc889113e342fb96b3e3a614eb76dece1e3d262cca30ccf63115064f21243985aad60f7095144d49dfe7ca60cbeb492ac3276375974d342573b2b0e931a050c6336b3722d2c7eaa3b838d8b3b6a939c5827d49c366e240e8ad7d0ca38b8d4fbfccd00400f3587d6b37ae20333cd2f1d70581484115eec3ba1f1a32fb21f3f3bdf36af80afa76422329e8a24fb5a0c4f33535d96584ceeba0d6c86b2554ce4c697c284c1dd2bfbf36f664c4a0d9e20abf214a5fbadd2448fe32961a4c6fe083c49e76bd21f874aba59ab6c2f6b1f10d6ada34123f315367cb23dcb7b7be0102a51e951b503daa0c784bfa9af7d3a5298adff4154f7e4d1a466dac225b44e5f82569ba0da3439bc3b5328ae99f503f4f236d146de57479214476ae4e0eea6136875f0f822006065221d7ed0a5a5e5bc3bfe64cc1c2555c57c4e934161d9856dd82ce0ca542df562dadc63c1327a647fff1cc4203cbdcc73e3f26e2caf74ff4024f184721b860788565231b930187013d1ab8f19e9fad8dac73eba13825ce7f3cc9fecaba54244e1c44601d61dd3c5b9652d7a9b061957f7d4e22820afcaed98f2cf677663b4f8927d0e4a357d28453f66f7914999008e2d6fc38fcf726b994bca51926d93fe5f2063368e8c26171f91fccea7deded50f63062514490a458aea1d00381a0c61c44aa8f6051d0b3a796ef32ecede396f61c2196eee4b1978ffb2925c62134f4599d53d9bb70bf8f493facee1511a9cea70ff90993e90518b418de91957f60f579477d288ffd8d5085a146c07a9224a195b76d161a0c5690b5bf7a527091164904940078df5e5ce1b8efa37590733002d30acea2730d10d47667bcbc8a6d55e71ec85de212ccf7a66e1eb2108c4e63fbf92d6ec67a396ac435c096e7f0b86233a3eac78c6bb61204110799fff16240519168638ff72106a38d8d21c9ce0ecc832980232586fb45c1a5d89f019a303add1d9071c54de156e36fd413c33f8d258ce8764e0e9a692033f9ab6bb2265177ef1eb9bc254da", "575b70327e288d863a3296a4b038446451da1d715dcf72584f7e57157db773581e3f05b5b38fbb646b543180bb3859b899aaa5a6025ec1228929b966fc5cd1f6fcd043b54c243a24342b593c056dfb709b183b8d5b7be9248d112a10537a53b619846556595e2624ba22fb900b5042a35df4a4a4685e094961eea7e14f1b991c7b1151d3f9e1673ae96c0013d6cac6103b58b29d0f852da60301cd49060dbe217a49611201e6e69f24b5f46a37493b91ff9708d34b28ac79ffbafb0c071d3ba6afe8a67fca6b52fa7cf1629cc0a48acfb7d8eee0bc1daa95a67bf5a1841e285b5a827a748cbf89b45a2f5a4d0e0f2edf4aceeccb4ce1cc30a94fa39bfd29eeea336756a8ce0b5ac3d3afe2c32bf89104febc88ebcd8441e57d0e14bec55f0331fc44a985e7c1846aebcc8da24afbe0b997843697fe4d904992da18c1502da4f20363fc3714955c2043ec6047f32273f187f89feb932bfa4a883a506e8510b3865bb91974a767dcae6f3608302e5fb5cc240cb3343492cd87e7d391eadb25c94155ef5107b8b8a3a21f9e895fed470f2d1749f2a2ed95cbd83a7a063fa32755089e257109931fdcc11ed689cc22dc151835e7510a354cff4116f517942fa1549788a4be12e5b0b8f5ba0747f0f1d539c9a0e741adb3ca9982a76618936dcdebf14a83a195b51b8e971a849d2271ff8509477c8b3e5acb7e1c8b4696fde3ba528ae8b94df751701b0add22155efd1d6afe63d3676cccd42470490cae54d395316ad61b5969d796b7dae8b0678472217a61baed5e4c8895925d7207216cb7b931ddfad3b82e69561b18ae72c4bf53536d3fa8bf85624f938748bc05413a063168ca4cf82a1e1321b1347c1edf01a7ca750460782a774419c02c2dc64c85e7a1b7d30b2ac267c3eff738dc19544c2334dd62ecfb96536579da2dccd80485bbbf3e0cfe5bfe3fc727ba000393b70cac9f97f120d9b2cd857d446ad348e6dd4775922e9d9b3daa685c70b964118622e57244b18c2d492770eefa1ae361e8970c8bf2b4daf2ba3b8f1a0583efa87aee5d33dd2749fc20b01ae3c19298e8cea32f30200053a88f8d24416ba3d27fb0ce471f4c5122f08c9920fde91bc5d82e1d7b38c319e70a5331d71fcfa162aca86ef95e65e943c5fb1686822b5d55dd52eca39a7dd4e43561ea0c124aec8ccc55307be6987babe69e04103587c568510ec1e8423da1a7ff67546da9565af79ec96c3398366787d5e3f8a255072f4391dca560aafc72490afe1238c884abf8ba699780c75a4f5842c1c0b454398913f5daa47ac727e1c6e832abe9c29a1d1a2c20f7a82fb0c6049d46926ac171423b53013d1c5f25f2aa3a4e5934622bb3a1db78153cfc42b73a51cf713c36e4588df5fb6247aeb49aa1dd3401df14911ab86cc1d6df1bb809fdcd94a7d15bf23ffdf5e71e16b33c7b4cbb06b3cff7a4df6822b5f180444955e7a4b2c5d924838199e914df709bb7d4f6e102714ad9f3a3220cc91ff3b401640029b706fc70a177087a3f153ce44faf6ce45ab131151946e2f2ffc3eb28a4c4516f73bcb68a2fd53223ca39ebce718134f9def0752b4064e77eb00bde5341a1740e6b3428921a9f67a5f39d0164020d82e03ebb8f5a2ff0dfaa154fc7da0cb75fa75787a7cb26f7b31a262150b1a4552210712a17d06de8fcd7b42ef7e807d0a04c4b823e700a57225b66262910fafdbf2fbb59b41cf5ee601b55a9079164866bd4b19273f48e597aed6060b6f4d04ee2fcb89361336ec072e1421e972511a09538309a7bb9415df2bdf27d951d28b764fc0c5ccf8b5bf5d3b40194bdada45d55ff888c31136177274ffffd661273e6f1244f1b214adee8921f0cfa51b54d43013f08735f44f3d6050ba4d5aae568dc56bb65462001f4911f82699d491a0c99ac8c957594f2a7b12fb1962ff30b28f76ce1fc98fd212e0155e3f2115837209372c092ffed5e47053d169b2b43a26d29abc7404353f7337c4b0f14ecfb664d46d27ef6c53dbab784cd3197b9e944aff0ecc092639af1b7b2c3094ba207e92d503cc11581609f96d63a0a989d713589aecf07a0b82b94cb02f6ecc79abf607882d2a3285eafbc4b38803cc0b5540303ae9069e7e95af7a08713e384e12711432990a4bd6de89abd81b64c85bce6be06d789c8e31a5d16d65c8913b59aac46e42c54ab8f771d40ce9749d4f11df4e3a04f97a358bdef5dc70253a0643bfaa9caae38c1968c5105a26bdd8d8154a90650ef203641e887f05eab43c6e183f163ef66a9eb6236a21241f18606a07f5086965955b340656c39d20fd3e4a216733c61109c1fa6d6bd81a2c7ea6ac262ad100c16747532dcd8e102691206358ee045066e5263ce3db4f56e3bf78b2550d14b16ba2b2d2f28da57019977cdf582e18e080160607c48eec9c7ead68e423670796a624a1bb28baca0037e54ea1677f1b2d7febd3b3cc84b463433a7e989c9ffc16dfa63105eb7b8deac2be3968b889060ba6255e8f18eb580ee53a23905d592cc67663a01cfd53d5582b9596b7b7da5ed8ea623d54b218b686ef9b7f03adfaba743a35b10054493122f2eb29e7ef9af586a0c244935cbb27db641f0b3001b2fcaf7adaaf054f7c0c0c6144d20ac1979baa6e62751d0bda2c94d5169364376a0191a5463b64731c2fe0814a6879a5e2df4e3eb58de3f7279ceb1fa5ed3e10929e6235334eb3ac8209b6935e6f6641418fb530d557de89121cbb70874b6dce07449215d29b7aaee3ea8868dbe60286f6bdee5c246c0a3c41b8108304a0dfce98e0a8575e25df87a6a1cca1dcdc89f9b6e900cdc23dc1a9fe9f3a54194ef16591a5edb83c5fe7e8fbf7fc37f43bcd685304c083f7859d69c7170637a5d7a4f75cc4051a723e84b8b806d33b25ceddb0dbec01da32850832f74d32bbdc4f108ecb22e9c5daec38d76b6576a64e67e8af93f242a1647846fb401de4baf6b7254d2fdb206fb760b3390c35205c9257595282c73f48851685d3c927d427d61d3dd92d77f9230ae0a6b2ed47925d7641ed1f0bc85466ffff32d6472909551e998a58e42cd447a8fb19c2ecf40d1049ac30edbb2f3945b14cb778bcec30747c3684b0d1a68ea7344976670828077fbcf5639cd4363b0cb488bee4c01809a0c945ee078f501373b7587250ffeed91dc14ec247025ef1a22948933b6fb0de4b587902b4dab7aa6815155b9f280ec5db747ca7ef69e20cc2ee6933b33842ebbba0b680da7d14607336da882b0f37209db4852fd3003d542b1079f303a54475709409f244c86282267bedadb2fcf785180a7da69f99f892c5998ea8cd9bdea8a124e6f4889bbac1e8d27a63b2793ae0a2f45f6fae532b8155ce36799e811b1a6a8032b4a28f594d92e8a203d9b9215379be8dd50827f6526b605f92cf6964273ddc79ffe7d980029a2800438c177a1bf47f0679154e7acda68c3c57c4eac8582c1b89bde3ea6aaa13f4c68c2374b95d754676f81c4c8c14e11c414540839cfd1e03113cddae75eb713828fbdb14a099440942fbd0d6dd8ec9019b5f99edeafe8f0aff6f54d5749424f0dce5253516542caaceba54348fe88fcff39e6dbbe38f5d26d23aaf340c07df6e690827adb0bbb791b33d87885b6094df3106d9d32fca254e8453b8b3b894a240f001a9b571f6425d2e03a92dc93044544d97ac52375b9e670bd3483587a0cf257177a4b588069cdce24f578d6c3ec97e7fd42ac98f72867a9946cc726845f38442ff21a5544640395df3808e81337027e0d4fb16fbed2fb8cf1c903b11bc3d47a9370e24e01a7595b51983da1c2167026efb939a0c3512aba45398e07eea75073f65640a1b24fa7364dc40bb29a33f2a8a9a555b58d123928450259435af2fd1c304329815ea636ff03048a5f2dceb707b0f42f42e05b7dd839beffdbb2537c41b6e4c8deafb483b3bed2a841eca4571a855a201659ac0533f7f8c0ab3272cd9465a9695b3534c428a6f1ee56f08cc682d5dd83fa761750d8fbaccd79bdf17fd518206b8bc3d8b7410cb5617b55abdfae42b616a83bd5ebb6fd2ee60d8314569afeccfbb1812c01b0eeb4d2a425a9f386924afe7a133b7536dccbc6bfddf6594069ad361fa2d271baa6c5709c683567d875694761ad4ea5a2b92cbe310b7af6dc593d1f2ac13f79d5f6eb688cde755cbf066d2eccd813f5c9a4db53e9c04f3e1661164ce7aaf29621b52a6c471c4b8bb70ddf67f2485a53d28176b99f8bc9bd12e545386aec28fb1678c782bf6a11f8f74827d96bf43b6ed5fd809c8a89cf4ebb3f716cd101274ce56a8da5abb51a1741be04904e60706d1e91fd7953e22cf0bfddbda5b6eeae1475b5bcc181fa4336e2e96de3392d1666d7f581d84c0e040e563f86288d8eb6ab7f95081aa6664d0b35cfb7fe1a73b488ae375a0daabea5b9ae0096087beb0682d75c4076e49680138f81d98a34a7539a255ae1f493221b8f84090d2609358d56a80e55517cc82bea69ae06e033c2f6bab6f63200fae78d4567f210c067c6d22085dd4c09513650bfcf561e6195e3a7af37097943e399d0cd733952c6af36a6e219be1cb216d657363b590eaf4310129c2b8d7c50f0a65590baaa2734ac564cef330b895eccd68d48cb6297b4f73ce7b5ece07b789e823f8b8c682a75db134d97c06e3a215fa1f9f53d7578112f222be1911ef9949453058e0e97fea6429e08a7bae29daf1386d4d49a65327233c828d659770f001b74f760672512ee42e0641569dc7fe0061bc50bbe4a6fc908e90c8fe43d94e4ccfae38ec1199896adcff6684680e09bf94f15bf3e0821ad6227f1397ad01ceca95663157839ea35c0686b7b41164938e520e89d65628d079c2186655255dccf0e6e480103891992a40c7a38c76b57ad56a6c73b871e08b9fb3db2891db4c35a8c668cebbd9b51d0e2c2e5579decdc1d688c8d575fbd38ccd9eaabdcbfe584db900d2f98a0e9902d511681cc43f1fe19b9260d2e0524f289e1fafbefa95fcabb6947cc6aa10982c17536b6bdabd748085613defe92f996f74eee08173c9bc124e1afdf105654c15fbb22b94c96bb8b40b1dfdebd9cedfff0ef9cf1db28319c3c3bdd43e7badf9d9c5e5bc33e4e20f9ce6a2d6ceea88eff7ee37e4e3a13ea790a69d569814a2fb641ca3035f1f972e34099e711244cc6a9e6f71e3c15f943f9337e2540d49dfbaed79c103c67ef36919ee6ed8d46fee61c2463d6cf4371c2ef9647e92e3edceb8a1a9652cd05fa5a6f83355c7a7dd0ba873405589428702279026bfb5f753c1e2784a501bf89e55e2ba8f10d791c6d97258677355c0ab27fe07040831c11606de34202664154eb143601a4bcf79946a7c9c3f047d137c275f2f801466b752016e55a4fb41b81ccf6681cf1ba069cc1c06a17a51ce5edc7251a2ca227e05238e5bf452df4d122d5584ed8fa39e61a6a6503056fcebee5da130c7ce7076f9968c421ac463b8c24e6b28f6813c9250f49519395d94611b01fca999750a9b8f956d304da9131150ea84e0bd8ab63caa6f6c241e663f612c610f30677949f751fbc4a6dec84ffc5f7f797f20db952f9da3ad06de1a0c4e695defe36ac12de4df46b10d45e04c7ec391ff1a3f5b10df4ed894cb49304a3e2b1438f3e3c7d18ea3c9668503503fbc0dba950bd725280bb9d7e5ecb89ab963b3959014bd4ff5522f25557cce6eee3b19e21fbb8c69028218173ed74806389cc93a9c8e34570ecbdfa225f396dd06a8098a31a23489ec881f39429d0e097023d39369051f5827da5c4"}) [ 235.833016] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)}], 0x1) 02:01:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x40, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da192442518", 0x0, 0x100}, 0x40) 02:01:13 executing program 0: setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:13 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001", 0x1d, 0x400}], 0x1, 0x0) 02:01:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)}], 0x1) 02:01:13 executing program 4: [ 236.091157] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:14 executing program 1: 02:01:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x40, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da192442518", 0x0, 0x100}, 0x40) 02:01:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:14 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001", 0x1d, 0x400}], 0x1, 0x0) 02:01:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f", 0x19}], 0x1) 02:01:14 executing program 4: 02:01:14 executing program 4: 02:01:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x40, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da192442518", 0x0, 0x100}, 0x40) 02:01:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f", 0x19}], 0x1) 02:01:14 executing program 1: [ 236.962306] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:14 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x1, 0x0) 02:01:14 executing program 4: 02:01:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:14 executing program 1: 02:01:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f", 0x19}], 0x1) 02:01:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x41, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181a", 0x0, 0x100}, 0x40) 02:01:14 executing program 1: 02:01:14 executing program 4: [ 237.278110] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2", 0x25}], 0x1) 02:01:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x41, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181a", 0x0, 0x100}, 0x40) 02:01:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:15 executing program 1: 02:01:15 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x1, 0x0) 02:01:15 executing program 4: 02:01:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2", 0x25}], 0x1) 02:01:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x41, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181a", 0x0, 0x100}, 0x40) 02:01:15 executing program 4: 02:01:15 executing program 1: 02:01:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 237.722458] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2", 0x25}], 0x1) 02:01:15 executing program 4: 02:01:15 executing program 1: 02:01:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0}, 0x40) 02:01:15 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x1, 0x0) 02:01:15 executing program 4: 02:01:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd1", 0x2b}], 0x1) [ 238.005824] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:15 executing program 1: 02:01:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0}, 0x40) 02:01:15 executing program 4: 02:01:15 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x1, 0x0) 02:01:15 executing program 1: 02:01:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd1", 0x2b}], 0x1) 02:01:15 executing program 4: [ 238.268980] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd1", 0x2b}], 0x1) 02:01:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0}, 0x40) 02:01:16 executing program 1: 02:01:16 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x1, 0x0) 02:01:16 executing program 4: 02:01:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40) 02:01:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766", 0x2e}], 0x1) 02:01:16 executing program 4: [ 238.554002] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:16 executing program 1: 02:01:16 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x1, 0x0) 02:01:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766", 0x2e}], 0x1) 02:01:16 executing program 4: 02:01:16 executing program 1: 02:01:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 238.812918] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:16 executing program 1: 02:01:16 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x1, 0x0) 02:01:16 executing program 4: 02:01:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766", 0x2e}], 0x1) 02:01:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40) 02:01:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 239.101347] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:16 executing program 1: 02:01:16 executing program 4: 02:01:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a83c", 0x30}], 0x1) 02:01:16 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x1, 0x0) 02:01:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 02:01:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 02:01:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=""/255, 0xff}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_triestat\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) 02:01:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8), 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:17 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a8", 0x2f}], 0x1) [ 239.405743] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 02:01:17 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a8", 0x2f}], 0x1) 02:01:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8), 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:17 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x1, 0x0) 02:01:17 executing program 1: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 02:01:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) keyctl$set_reqkey_keyring(0xe, 0x3) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x10000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000fb1000)=[{&(0x7f0000000000)="480000001400197f09004b0109048c590a88bfffff010001000000010028213ee20600d4ff5bffff00c7e5ed5e0000000000d5a49b19007a9eace3dbe8b12c000000000000000000", 0x48}], 0x1) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='\x00\x8c\x9b\x8bS') syz_open_procfs(0x0, &(0x7f0000000580)='setgroups\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB="00a095d347150000000000", @ANYRES16=r5, @ANYBLOB="00022bbd7000ffdbdf25070000000400020014000100080001000a00000008000500020000000c00020008000b003a4b000008000500030000002400020008000b00020000"], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$int_in(r1, 0x5f92917ebb8de723, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r6, 0x8923, &(0x7f0000000700)={'eql:\xb3\x87\x00\x00\x00\x00\x00\x00\x00\x02\x00', @ifru_flags=0x3301}) pipe2(0x0, 0xa3c8640967c914a8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0x103002) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0xc, 0x3}, 0x14) sync_file_range(r6, 0x0, 0x8, 0x4) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x2000, 0x0) r8 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x2, @in=@empty, 0x0, 0x4, 0x3, 0x2}}, 0xe8) sendmmsg(r8, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000400)) 02:01:17 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="affdda9d240040005a90f5337615f18d831148c90ba3af817f07703aeff0f64ebbee0796e2ee772e072dd183d766a8", 0x2f}], 0x1) [ 240.140630] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f086dd1fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 02:01:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8), 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:17 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='mem\x00\x00\x00\x00\x00\x00\a\x13\x00'/258, 0x275a, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$UHID_INPUT(r2, &(0x7f0000000640)={0x8, "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", 0x1000}, 0x1006) [ 240.288622] : renamed from eql 02:01:17 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 02:01:17 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x1, 0x0) [ 240.475206] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4c87a2bbff7b94efc08ab12", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:01:18 executing program 1: open(&(0x7f0000000040)='..', 0x0, 0x0) open(&(0x7f0000000040)='..', 0x0, 0x0) 02:01:18 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x1, 0x0) 02:01:18 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @random="9eb00793ffec", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp}}}}, 0x0) [ 240.823409] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:18 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @random="9eb00793ffec", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp}}}}, 0x0) 02:01:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000280)=""/140, 0x8c}, {&(0x7f0000000340)=""/220, 0xdc}, {&(0x7f0000000440)=""/122, 0x7a}, {&(0x7f00000004c0)=""/138, 0x8a}, {&(0x7f0000000580)=""/243, 0xf3}, {&(0x7f0000002300)=""/4096, 0x1000}], 0x6}}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000b40)=""/114, 0x72}, {&(0x7f0000003300)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 02:01:18 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='nls=']) 02:01:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:18 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x1, 0x0) 02:01:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) keyctl$set_reqkey_keyring(0xe, 0x3) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x10000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000fb1000)=[{&(0x7f0000000000)="480000001400197f09004b0109048c590a88bfffff010001000000010028213ee20600d4ff5bffff00c7e5ed5e0000000000d5a49b19007a9eace3dbe8b12c000000000000000000", 0x48}], 0x1) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='\x00\x8c\x9b\x8bS') syz_open_procfs(0x0, &(0x7f0000000580)='setgroups\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB="00a095d347150000000000", @ANYRES16=r5, @ANYBLOB="00022bbd7000ffdbdf25070000000400020014000100080001000a00000008000500020000000c00020008000b003a4b000008000500030000002400020008000b00020000"], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$int_in(r1, 0x5f92917ebb8de723, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r6, 0x8923, &(0x7f0000000700)={'eql:\xb3\x87\x00\x00\x00\x00\x00\x00\x00\x02\x00', @ifru_flags=0x3301}) pipe2(0x0, 0xa3c8640967c914a8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0x103002) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0xc, 0x3}, 0x14) sync_file_range(r6, 0x0, 0x8, 0x4) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x2000, 0x0) r8 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x2, @in=@empty, 0x0, 0x4, 0x3, 0x2}}, 0xe8) sendmmsg(r8, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000400)) 02:01:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:18 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @random="9eb00793ffec", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp}}}}, 0x0) [ 241.290989] hfsplus: unable to parse mount options [ 241.298916] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 241.399291] hfsplus: unable to parse mount options 02:01:19 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x1, 0x0) 02:01:19 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002f00)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 02:01:19 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @random="9eb00793ffec", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp}}}}, 0x0) 02:01:19 executing program 1: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) io_setup(0x4, &(0x7f00000000c0)=0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000000)="86", 0x1) io_destroy(r2) 02:01:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:19 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) [ 241.691444] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 241.697142] device nr0 entered promiscuous mode 02:01:19 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) keyctl$set_reqkey_keyring(0xe, 0x3) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x10000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000fb1000)=[{&(0x7f0000000000)="480000001400197f09004b0109048c590a88bfffff010001000000010028213ee20600d4ff5bffff00c7e5ed5e0000000000d5a49b19007a9eace3dbe8b12c000000000000000000", 0x48}], 0x1) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='\x00\x8c\x9b\x8bS') syz_open_procfs(0x0, &(0x7f0000000580)='setgroups\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB="00a095d347150000000000", @ANYRES16=r5, @ANYBLOB="00022bbd7000ffdbdf25070000000400020014000100080001000a00000008000500020000000c00020008000b003a4b000008000500030000002400020008000b00020000"], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$int_in(r1, 0x5f92917ebb8de723, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r6, 0x8923, &(0x7f0000000700)={'eql:\xb3\x87\x00\x00\x00\x00\x00\x00\x00\x02\x00', @ifru_flags=0x3301}) pipe2(0x0, 0xa3c8640967c914a8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) syz_open_dev$loop(0x0, 0x6, 0x103002) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0xc, 0x3}, 0x14) sync_file_range(r6, 0x0, 0x8, 0x4) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x2000, 0x0) r8 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x2, @in=@empty, 0x0, 0x4, 0x3, 0x2}}, 0xe8) sendmmsg(r8, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000400)) 02:01:19 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x1, 0x0) 02:01:19 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 02:01:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:19 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) [ 242.007021] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 242.500905] device nr0 entered promiscuous mode 02:01:20 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1) 02:01:20 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x1, 0x0) 02:01:20 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @random="9eb00793ffec", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp}}}}, 0x0) 02:01:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0), 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x3, 0x3c) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080), &(0x7f0000000140)=0x133) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a4d0) splice(r1, 0x0, r3, 0x0, 0x19404, 0x0) 02:01:20 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:20 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @random="9eb00793ffec", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp}}}}, 0x0) [ 242.893420] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:01:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb45}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) tkill(0x0, 0x11) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 02:01:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0), 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:20 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 02:01:20 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @random="9eb00793ffec", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp}}}}, 0x0) [ 243.118942] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:01:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0), 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r0, 0x6611, 0x0) 02:01:20 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 02:01:20 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @random="9eb00793ffec", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp}}}}, 0x0) 02:01:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 243.356336] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:01:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffa, 0x4) sendto$inet(r0, 0x0, 0xff1b, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000001ac0)="8c5e9e81e0f7ab32", 0x1192aca8268c9077, 0x4, 0x0, 0xfe5f) 02:01:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000140)) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 02:01:21 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x25dfdbfe}, 0xffffffffffffffba) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 02:01:21 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @random="9eb00793ffec", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp}}}}, 0x0) 02:01:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:21 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) [ 243.740057] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:01:21 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @random="9eb00793ffec", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp}}}}, 0x0) 02:01:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 243.840805] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:01:21 executing program 3: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x8000}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:21 executing program 2: select(0x40, &(0x7f00000006c0)={0x6}, 0x0, 0x0, &(0x7f0000000780)) 02:01:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x20000004e20, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x24000000, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x23, 0x28, 0x2, 0x1d, 0x3}) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) sendto$inet(r1, &(0x7f00000001c0)="83", 0x1, 0x4081, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000200)="14", 0x1, 0x0, 0x0, 0xfffffffffffffea8) recvfrom$inet(r1, 0x0, 0x78, 0x0, 0x0, 0x0) [ 244.390280] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:01:22 executing program 4: syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000740)) r0 = getpid() socket(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:01:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000440)='cpuset.cpus\x00\xaa\xef+e\xcb\x98\xe6xm\xbe\xf2F\x96%\x12G\xc8X`\xed\xbe\xce\xdea', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x1000) 02:01:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000560007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffff000000eff24d8238cfa47e23f7efbf5400"/76, 0x4c}], 0x1}, 0x0) 02:01:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x20000004e20, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x24000000, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x23, 0x28, 0x2, 0x1d, 0x3}) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) sendto$inet(r1, &(0x7f00000001c0)="83", 0x1, 0x4081, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000200)="14", 0x1, 0x0, 0x0, 0xfffffffffffffea8) recvfrom$inet(r1, 0x0, 0x78, 0x0, 0x0, 0x0) [ 244.676065] nla_parse: 3 callbacks suppressed [ 244.676074] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 02:01:22 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:22 executing program 5: socket$inet(0x10, 0x80802, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='\x00\xaeC\xae\xc4\x05\xa9\xbd~\xfb\x96\xf7,k\x1a+@\xe54\x01\x01\x01\x00w\xa7\x04~\\\xd4Y\x04\xaf^\xc6\xf2\x98\"\xa0\xa1\x04\xaf\x81\x00ov0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000040)='f', 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) 02:01:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x4161) 02:01:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:24 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:24 executing program 4: [ 246.812206] device nr0 entered promiscuous mode 02:01:24 executing program 4: 02:01:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 247.364140] device nr0 entered promiscuous mode 02:01:24 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:25 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x199000}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f00000002c0)=""/81) chdir(&(0x7f00000001c0)='./file0\x00') r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYRES16, @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x800) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x42000006}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)={0x188, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x70, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0xc}}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10000}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xe775}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xf2ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xc6dfff8c64621590}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x188}, 0x1, 0x0, 0x0, 0x20000000}, 0x20) preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xbfffd000) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r4, &(0x7f0000000240)='net/ip6_mr_cache\x00') bind$vsock_dgram(r3, &(0x7f0000000180)={0x28, 0x0, 0x2711, @reserved}, 0x10) 02:01:25 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:25 executing program 5: 02:01:25 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) rt_sigprocmask(0x0, &(0x7f0000000200)={0xfffffffffffffffe}, 0x0, 0x8) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f00000003c0)="91", 0x1}], 0x1, 0x0) clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0) close(r0) 02:01:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:25 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 02:01:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:25 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:25 executing program 4: 02:01:25 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:25 executing program 5: 02:01:25 executing program 1: creat(&(0x7f0000000500)='./file0\x00', 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:26 executing program 2: 02:01:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:26 executing program 5: 02:01:26 executing program 4: 02:01:26 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:26 executing program 1: creat(&(0x7f0000000500)='./file0\x00', 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:26 executing program 5: 02:01:26 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:26 executing program 4: 02:01:26 executing program 1: creat(&(0x7f0000000500)='./file0\x00', 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:26 executing program 2: 02:01:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:26 executing program 4: 02:01:26 executing program 5: 02:01:26 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:26 executing program 5: 02:01:26 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:26 executing program 2: 02:01:26 executing program 4: 02:01:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:26 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:26 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:26 executing program 2: 02:01:26 executing program 4: 02:01:26 executing program 5: 02:01:26 executing program 2: 02:01:27 executing program 4: 02:01:27 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:27 executing program 5: 02:01:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09), 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:27 executing program 2: 02:01:27 executing program 5: 02:01:27 executing program 4: 02:01:27 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09), 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:27 executing program 5: 02:01:27 executing program 2: 02:01:27 executing program 4: 02:01:27 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:27 executing program 5: 02:01:27 executing program 4: 02:01:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:27 executing program 2: 02:01:27 executing program 4: 02:01:27 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09), 0x0, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:01:27 executing program 5: 02:01:27 executing program 2: pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="fc0000004900070fab092500090007000a0600000000000000013693210001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 02:01:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:27 executing program 5: r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000040)="240000003a00d17da53a7436fef7001d0a0b49ffed000009000028000800030001000000", 0x24) recvmmsg(r0, &(0x7f0000006680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 02:01:27 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1d, 0x400000000000109, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 02:01:27 executing program 1: creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, 0x0, 0x0) [ 250.284181] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.2'. [ 250.339708] selinux_nlmsg_perm: 69 callbacks suppressed [ 250.339724] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10580 comm=syz-executor.2 [ 250.424921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10580 comm=syz-executor.2 [ 250.449891] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10580 comm=syz-executor.2 02:01:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 02:01:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, 0x0, 0x0) 02:01:28 executing program 1: creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:28 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000011000901000000000000000007000000"], 0x14}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 02:01:28 executing program 3: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') [ 250.479751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10580 comm=syz-executor.2 [ 250.492779] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10580 comm=syz-executor.2 [ 250.505962] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10580 comm=syz-executor.2 02:01:28 executing program 3: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') [ 250.577933] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10580 comm=syz-executor.2 [ 250.635898] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10580 comm=syz-executor.2 [ 250.700057] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10580 comm=syz-executor.2 [ 250.714252] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10580 comm=syz-executor.2 02:01:28 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/icmp6\x00') unshare(0x28020400) dup3(r0, r1, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, 0x0, &(0x7f0000000100)) mq_open(&(0x7f00000000c0)=':md5sum\x00', 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 02:01:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, 0x0, 0x0) 02:01:28 executing program 1: creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:28 executing program 4: 02:01:28 executing program 2: 02:01:28 executing program 3: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:28 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:28 executing program 4: 02:01:28 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:28 executing program 2: 02:01:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:28 executing program 2: 02:01:29 executing program 5: 02:01:29 executing program 4: 02:01:29 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:29 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:29 executing program 2: 02:01:29 executing program 4: 02:01:29 executing program 2: 02:01:29 executing program 5: 02:01:29 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:29 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:01:29 executing program 4: 02:01:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:29 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r3 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0x70}, {0x80000006}]}, 0x10) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x1f4, 0x0, 0x1201000000003618) 02:01:29 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(0x0, 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:29 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") sendmsg(r0, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000160007841dfffd946f6105000a0081001f038b0504000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 252.027221] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:01:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:29 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x400000000004e22, 0x0, @mcast2}, 0x1c) sendto$inet6(r0, &(0x7f00000003c0)="f8", 0x20010373, 0x4000000, 0x0, 0x0) [ 252.137520] protocol 88fb is buggy, dev hsr_slave_0 [ 252.142681] protocol 88fb is buggy, dev hsr_slave_1 02:01:29 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) [ 252.204881] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 02:01:29 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") socket$packet(0x11, 0xa, 0x300) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x1f4, 0x0, 0x1201000000003618) 02:01:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) [ 252.377528] protocol 88fb is buggy, dev hsr_slave_0 [ 252.382722] protocol 88fb is buggy, dev hsr_slave_1 02:01:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) [ 252.523219] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:01:30 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:30 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x80045440, &(0x7f0000000000)) 02:01:30 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(0x0, 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:30 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) [ 252.955170] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:01:30 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0xfffffffffffff3b3, 0x8) 02:01:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a00010005000d000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) 02:01:30 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:30 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000080)={0x4, "8abbb1fcd26d90a7ee5176258bac03b932ee94abb540d9629b00", 0x0, 0x200}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x10001, 0x8000}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000002c0)) r1 = getpid() socket(0x10, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x4000000}, 0x792fdbf82bceb6ff) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 02:01:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) [ 253.273189] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 02:01:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:31 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000080)={0x4, "8abbb1fcd26d90a7ee5176258bac03b932ee94abb540d9629b00", 0x0, 0x200}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x10001, 0x8000}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000740)) r1 = getpid() socket(0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 02:01:31 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:31 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(0x0, 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 02:01:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2) recvmmsg(r1, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2) recvmmsg(r1, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:31 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff00c}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$nbd(0x0) 02:01:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2) recvmmsg(r1, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) [ 254.457510] protocol 88fb is buggy, dev hsr_slave_0 [ 254.462789] protocol 88fb is buggy, dev hsr_slave_1 02:01:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 02:01:32 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:32 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(0x0, 0x0, 0x0) 02:01:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newsa={0x140, 0x10, 0x501, 0x0, 0x0, {{@in6=@mcast2, @in6=@mcast2}, {@in6=@dev, 0x0, 0x6c}, @in6=@rand_addr="9a18d97658ffb665114fb6fcb75bc0a6", {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @output_mark={0x8}]}, 0x140}}, 0x0) 02:01:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:32 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xff0f, 0x72, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) 02:01:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:32 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newsa={0x140, 0x10, 0x501, 0x0, 0x0, {{@in6=@mcast2, @in6=@mcast2}, {@in6=@dev, 0x0, 0x6c}, @in6=@rand_addr="9a18d97658ffb665114fb6fcb75bc0a6", {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @output_mark={0x8}]}, 0x140}}, 0x0) 02:01:32 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xff0f, 0x72, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) 02:01:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:33 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(0x0, 0x0, 0x0) 02:01:33 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:33 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(0x0, 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:33 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/230, 0xe6) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000180)=@req={0x20, &(0x7f0000000140)={'ip6gre0\x00', @ifru_flags}}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0xc0fbff00000000) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000540)={@empty, @dev, @loopback, 0x2, 0x0, 0x0, 0x0, 0x8, 0x80100105}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r3) syz_open_procfs(0x0, &(0x7f00000002c0)='limits\x00') sendto$inet(r2, 0x0, 0x13db, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1fa0}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 02:01:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xff0f, 0x72, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) 02:01:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:33 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:33 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(0x0, 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xff0f, 0x72, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) 02:01:33 executing program 2: sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xbe199e0d447a8e42, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="fe99f56245000000000000c61f7281c46fff5e00", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c4}}, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfb}, 0x14}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201fdffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 02:01:33 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2) recvmmsg(r1, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:33 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(0x0, 0x0, 0x0) 02:01:33 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xff0f, 0x72, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 02:01:33 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(0x0, 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:01:33 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2) recvmmsg(r1, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5420, &(0x7f0000000080)) 02:01:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xff0f, 0x72, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 02:01:33 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfff2) recvmmsg(r1, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) socketpair(0xa, 0x80a, 0xd01, &(0x7f0000000340)) recvmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffffffffffd37, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 02:01:33 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file1\x00') 02:01:33 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) [ 256.703833] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 256.733135] audit: type=1400 audit(1569981694.295:53): avc: denied { setopt } for pid=10930 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:01:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) socketpair(0xa, 0x80a, 0xd01, &(0x7f0000000340)) recvmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffffffffffd37, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 02:01:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xff0f, 0x72, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 02:01:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file1\x00') 02:01:34 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7b40000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df833c2b8d3c27fbc88a262e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd026186f88aff9a4ea5978b9d97504800fd6d5e557c6f1457654c51e5454286f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab91216f1cde8eb32ca4346fa9b22060d2cf09b2855564fe77cf8b7bcec7063fcfdcbb2ad1f39277e4b51caa37836ed5cb3851cbcf63427787314bd4886805864dc850bc97b19e0577299f30c2004da06409d4ef85be567e026aca084f6798248cf0dc8ea28e74fc567c054b2a9016d411b1df6ce2a889e0eaef07e200de907944a63e56de457630a66752106901164bfa1c6eea38762829f689b4b238f993737cd3be5c949504e70c6165af415851cc43955a662af8f0cad2e11d708feda172b40a9ca5863ec15c756877b4fe602a8a604930f1146497344ac661889a4f8cb7087a7ab85b05559396ca13b919fbf47b55c89499508009474788408ea12668b8e28da6ff5fd0e1b163e8750bd2d2f82cbbfa874b349533a583f19d0305c541f031eed18b47ddc61e0b97ee67f79ca71d3fa063483ab27f2c2ba185be30ebaef65495e32d0ee1aa3caeba0af7be8d3a4f14df6762227b02bbc2c1427e46358fbf77e9aa7c66fc431b864c50e522a0bebfdec7dc6ec662bc724b1e85d35df3917736131ec0c7a039df1b8c20774e545184de39e694e87281cbc342cd6e245336ff4edccaab297c22767555f689c0f09878bb79bb18f01e9ee8a2a28a9030641f210e476ad6c64f05268411a6674b9abad812549a67009d6537bae2a547d276310f6a870b9d90e1f701238afd9bd714e805a401a135e31cae730fd14cc44159a41632d1bfc7a279fd004ba6ec0985dba25587dc8e8d960b8357b60fddc67ae59a8b6e8a06b488d2d15470759f5af81677fd70dc8f2fdc58e62ef16770fbd968c4b4aaed72f932b2127c8f5854b660c3287b3b518979e2fbb17577103a48855dd2e21b0a14e7154f7a783dc1bf2f8f0e8654d313f8c7398751ce3a67a82dcae47449e81610137f179eae76086e8fe007afd17"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) socketpair(0xa, 0x80a, 0xd01, &(0x7f0000000340)) recvmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffffffffffd37, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 02:01:34 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) 02:01:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file1\x00') 02:01:34 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) 02:01:34 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) [ 257.237893] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 02:01:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) socketpair(0xa, 0x80a, 0xd01, &(0x7f0000000340)) recvmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffffffffffd37, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 02:01:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', 0x0) 02:01:34 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) 02:01:34 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) [ 257.622441] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. [ 257.636423] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 02:01:35 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945fa8aca77df7b091c97554bb657c101e460080000000000000075900001943449fc1dcf86e495e44fa58f61edfb1b5af0274"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x70, 0x5, 0xd9, 0x81, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x1ff, 0x1, 0x0, 0x7, 0x8, 0x3, 0x8e45, 0x0, 0x2, 0x0, 0x0, 0x0, 0x23, 0xa, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x3, @perf_config_ext={0x96d, 0x6}, 0x3202, 0x8, 0x0, 0x0, 0x1ff}, r3, 0xe, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080)=0x900000000000000, 0x297ef) r5 = getpid() socket$kcm(0x2b, 0x5, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x70, 0x5, 0xd9, 0x0, 0x1ff, 0x0, 0x0, 0x241, 0x20831925dc019f42, 0x80000001, 0x0, 0x1ff, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x2, 0x80000000, 0x6, 0x0, 0x23, 0xa, 0x5, 0x0, 0x80000001, 0x0, 0xffff, 0x3, 0x0, 0x2, 0x0, 0x4, 0x1d85df6, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x969, 0x6}, 0x3202, 0x8, 0x8, 0x1, 0x1ff}, r5, 0xe, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x64, &(0x7f0000000100)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd'}, 0x30) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) perf_event_open$cgroup(0x0, r7, 0x0, r6, 0x0) mkdirat$cgroup(r7, &(0x7f0000000280)='syz0\x00', 0x1ff) 02:01:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:35 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', 0x0) 02:01:35 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) 02:01:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) socketpair(0xa, 0x80a, 0xd01, &(0x7f0000000340)) recvmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffffffffffd37, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 02:01:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:35 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) 02:01:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:35 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', 0x0) 02:01:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:35 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) [ 258.012442] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 02:01:35 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945fa8aca77df7b091c97554bb657c101e460080000000000000075900001943449fc1dcf86e495e44fa58f61edfb1b5af0274"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x70, 0x5, 0xd9, 0x81, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x1ff, 0x1, 0x0, 0x7, 0x8, 0x3, 0x8e45, 0x0, 0x2, 0x0, 0x0, 0x0, 0x23, 0xa, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x3, @perf_config_ext={0x96d, 0x6}, 0x3202, 0x8, 0x0, 0x0, 0x1ff}, r3, 0xe, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080)=0x900000000000000, 0x297ef) r5 = getpid() socket$kcm(0x2b, 0x5, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x70, 0x5, 0xd9, 0x0, 0x1ff, 0x0, 0x0, 0x241, 0x20831925dc019f42, 0x80000001, 0x0, 0x1ff, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x2, 0x80000000, 0x6, 0x0, 0x23, 0xa, 0x5, 0x0, 0x80000001, 0x0, 0xffff, 0x3, 0x0, 0x2, 0x0, 0x4, 0x1d85df6, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x969, 0x6}, 0x3202, 0x8, 0x8, 0x1, 0x1ff}, r5, 0xe, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x64, &(0x7f0000000100)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd'}, 0x30) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) perf_event_open$cgroup(0x0, r7, 0x0, r6, 0x0) mkdirat$cgroup(r7, &(0x7f0000000280)='syz0\x00', 0x1ff) 02:01:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:35 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x200000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000001c80)={&(0x7f0000000540)=@alg, 0x80, 0x0}, 0x40) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0xfffe, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000300)={'teql0\x00', @local}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000001b80)="6c36c715d5f21d9c22a00b17bbf049c361f543c8cac681c2d537d43fb1dacd3c477fbdcd062f", 0x0, 0x3}, 0x20) r2 = socket$kcm(0x10, 0xffffffffffffffff, 0x10) sendmsg$kcm(r2, 0x0, 0x1ffffffc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'bcsh0\x00', 0x20}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r4 = socket$kcm(0x10, 0x3, 0x10) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000003c0)) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000006500)={&(0x7f00000063c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006480)=[{&(0x7f0000006440)=""/64, 0x40}], 0x1, &(0x7f00000064c0)=""/11, 0xb}, 0x10141) bpf$PROG_LOAD(0x5, &(0x7f0000006600)={0x4, 0x17, &(0x7f0000001f00)=ANY=[@ANYBLOB="000000000000000085000000380000009500000000000000ec720a39bb38218961b3bbab1127434f3670dfe301746d578638d7f2d08af5946645e3ab98bc6a5c5a970c816f2c7d6c40a6e6335b08af5ae4d9e8a7594c03a21df56a31a3de5499614a26a9dff0baa25920008ce63c3ec81a1ca03af3b44eac6e6beb9612fb52af7511267b37cb174a0bbcc4c41b3ff9b2f5813d9a89c4d7b4b436365ba763c6a0edfa8e032eb4bd2f4b4aa769a614402ff745a3f2463fa4bb2dc26599"], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x1, [], r5, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000006580)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000065c0)={0x3, 0x5, 0x8a, 0x6}, 0x10}, 0x70) write$cgroup_type(r3, &(0x7f0000000340)='threaded\x00', 0xffffffffffffffd2) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffff72, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 02:01:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7b40000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df833c2b8d3c27fbc88a262e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd026186f88aff9a4ea5978b9d97504800fd6d5e557c6f1457654c51e5454286f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab91216f1cde8eb32ca4346fa9b22060d2cf09b2855564fe77cf8b7bcec7063fcfdcbb2ad1f39277e4b51caa37836ed5cb3851cbcf63427787314bd4886805864dc850bc97b19e0577299f30c2004da06409d4ef85be567e026aca084f6798248cf0dc8ea28e74fc567c054b2a9016d411b1df6ce2a889e0eaef07e200de907944a63e56de457630a66752106901164bfa1c6eea38762829f689b4b238f993737cd3be5c949504e70c6165af415851cc43955a662af8f0cad2e11d708feda172b40a9ca5863ec15c756877b4fe602a8a604930f1146497344ac661889a4f8cb7087a7ab85b05559396ca13b919fbf47b55c89499508009474788408ea12668b8e28da6ff5fd0e1b163e8750bd2d2f82cbbfa874b349533a583f19d0305c541f031eed18b47ddc61e0b97ee67f79ca71d3fa063483ab27f2c2ba185be30ebaef65495e32d0ee1aa3caeba0af7be8d3a4f14df6762227b02bbc2c1427e46358fbf77e9aa7c66fc431b864c50e522a0bebfdec7dc6ec662bc724b1e85d35df3917736131ec0c7a039df1b8c20774e545184de39e694e87281cbc342cd6e245336ff4edccaab297c22767555f689c0f09878bb79bb18f01e9ee8a2a28a9030641f210e476ad6c64f05268411a6674b9abad812549a67009d6537bae2a547d276310f6a870b9d90e1f701238afd9bd714e805a401a135e31cae730fd14cc44159a41632d1bfc7a279fd004ba6ec0985dba25587dc8e8d960b8357b60fddc67ae59a8b6e8a06b488d2d15470759f5af81677fd70dc8f2fdc58e62ef16770fbd968c4b4aaed72f932b2127c8f5854b660c3287b3b518979e2fbb17577103a48855dd2e21b0a14e7154f7a783dc1bf2f8f0e8654d313f8c7398751ce3a67a82dcae47449e81610137f179eae76086e8fe007afd17"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) socketpair(0xa, 0x80a, 0xd01, &(0x7f0000000340)) 02:01:35 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) 02:01:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000043f6a9e358eaa828cba05c14bb89774b4e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0xf, 0x0, &(0x7f00000004c0)="dfadc6f622c36e985cde2b958b1ac1", 0x0, 0x7fffffff}, 0x28) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d5", 0x0, 0x100}, 0x28) 02:01:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) [ 258.492977] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 02:01:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:36 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000160007841dfffd946f6105000a0081001f038b0504000800080006000400ff7e", 0x24}], 0x1}, 0x0) 02:01:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7b40000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df833c2b8d3c27fbc88a262e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd026186f88aff9a4ea5978b9d97504800fd6d5e557c6f1457654c51e5454286f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab91216f1cde8eb32ca4346fa9b22060d2cf09b2855564fe77cf8b7bcec7063fcfdcbb2ad1f39277e4b51caa37836ed5cb3851cbcf63427787314bd4886805864dc850bc97b19e0577299f30c2004da06409d4ef85be567e026aca084f6798248cf0dc8ea28e74fc567c054b2a9016d411b1df6ce2a889e0eaef07e200de907944a63e56de457630a66752106901164bfa1c6eea38762829f689b4b238f993737cd3be5c949504e70c6165af415851cc43955a662af8f0cad2e11d708feda172b40a9ca5863ec15c756877b4fe602a8a604930f1146497344ac661889a4f8cb7087a7ab85b05559396ca13b919fbf47b55c89499508009474788408ea12668b8e28da6ff5fd0e1b163e8750bd2d2f82cbbfa874b349533a583f19d0305c541f031eed18b47ddc61e0b97ee67f79ca71d3fa063483ab27f2c2ba185be30ebaef65495e32d0ee1aa3caeba0af7be8d3a4f14df6762227b02bbc2c1427e46358fbf77e9aa7c66fc431b864c50e522a0bebfdec7dc6ec662bc724b1e85d35df3917736131ec0c7a039df1b8c20774e545184de39e694e87281cbc342cd6e245336ff4edccaab297c22767555f689c0f09878bb79bb18f01e9ee8a2a28a9030641f210e476ad6c64f05268411a6674b9abad812549a67009d6537bae2a547d276310f6a870b9d90e1f701238afd9bd714e805a401a135e31cae730fd14cc44159a41632d1bfc7a279fd004ba6ec0985dba25587dc8e8d960b8357b60fddc67ae59a8b6e8a06b488d2d15470759f5af81677fd70dc8f2fdc58e62ef16770fbd968c4b4aaed72f932b2127c8f5854b660c3287b3b518979e2fbb17577103a48855dd2e21b0a14e7154f7a783dc1bf2f8f0e8654d313f8c7398751ce3a67a82dcae47449e81610137f179eae76086e8fe007afd17"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) socketpair(0xa, 0x80a, 0xd01, &(0x7f0000000340)) 02:01:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:01:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) 02:01:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:01:36 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4c87a2bbff7b94efc08ab12f728db4b2b4d2f2fba0398", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000380)="a3", 0x1}], 0x1, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:01:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) [ 258.968173] ptrace attach of "/root/syz-executor.1"[11102] was attempted by "/root/syz-executor.1"[11103] [ 258.977344] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 459.687085] syz-fuzzer invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 459.717553] syz-fuzzer cpuset=/ mems_allowed=0-1 [ 459.722805] CPU: 0 PID: 7696 Comm: syz-fuzzer Not tainted 4.19.76 #0 [ 459.729392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.738760] Call Trace: [ 459.741482] dump_stack+0x172/0x1f0 [ 459.745172] dump_header+0x15e/0xa55 [ 459.748904] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 459.754139] ? ___ratelimit+0x60/0x595 [ 459.758226] ? do_raw_spin_unlock+0x57/0x270 [ 459.762647] oom_kill_process.cold+0x10/0x6ef [ 459.767159] ? lock_downgrade+0x880/0x880 [ 459.771523] ? kasan_check_read+0x11/0x20 [ 459.775983] out_of_memory+0x936/0x12d0 [ 459.779989] ? oom_killer_disable+0x280/0x280 [ 459.784503] ? mutex_trylock+0x18e/0x1e0 [ 459.788643] ? __alloc_pages_slowpath+0xcc2/0x2870 [ 459.793592] __alloc_pages_slowpath+0x20af/0x2870 [ 459.798461] ? warn_alloc+0x110/0x110 [ 459.802265] ? __lock_is_held+0xb6/0x140 [ 459.806396] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 459.812028] ? should_fail+0x14d/0x85c [ 459.816097] ? __might_sleep+0x95/0x190 [ 459.820098] __alloc_pages_nodemask+0x617/0x750 [ 459.824781] ? kasan_check_read+0x11/0x20 [ 459.828945] ? __alloc_pages_slowpath+0x2870/0x2870 [ 459.833966] ? find_get_entry+0x3e8/0x820 [ 459.838126] ? filemap_map_pages+0x1130/0x1130 [ 459.842886] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 459.848590] alloc_pages_current+0x107/0x210 [ 459.853011] __page_cache_alloc+0x2bd/0x450 [ 459.857342] ? kasan_check_read+0x11/0x20 [ 459.861509] filemap_fault+0x10bb/0x2250 [ 459.865582] ? lock_downgrade+0x880/0x880 [ 459.869748] ? __lock_page_or_retry+0xdc0/0xdc0 [ 459.874421] ? lock_acquire+0x16f/0x3f0 [ 459.878547] ? ext4_filemap_fault+0x7b/0xaf [ 459.883843] ext4_filemap_fault+0x83/0xaf [ 459.888382] __do_fault+0x111/0x480 [ 459.892049] __handle_mm_fault+0x2d78/0x3f80 [ 459.896466] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 459.901330] ? count_memcg_event_mm+0x2b1/0x4d0 [ 459.906009] handle_mm_fault+0x1b5/0x690 [ 459.911276] __do_page_fault+0x62a/0xe90 [ 459.915348] ? lock_downgrade+0x880/0x880 [ 459.919511] ? vmalloc_fault+0x740/0x740 [ 459.923638] ? trace_hardirqs_off_caller+0x65/0x220 [ 459.928785] ? trace_hardirqs_on_caller+0x6a/0x220 [ 459.933716] ? page_fault+0x8/0x30 [ 459.937265] do_page_fault+0x71/0x57d [ 459.941070] ? page_fault+0x8/0x30 [ 459.944619] page_fault+0x1e/0x30 [ 459.948086] RIP: 0033:0x437f70 [ 459.951293] Code: Bad RIP value. [ 459.954659] RSP: 002b:00007ffc003d2cf0 EFLAGS: 00010202 [ 459.960025] RAX: 000000c42002c500 RBX: 0000000000000002 RCX: 00000000000000e7 [ 459.967294] RDX: 0000000000000000 RSI: 000000c420020060 RDI: 0000000000000001 [ 459.974740] RBP: 00007ffc003d2d20 R08: 0000000000000000 R09: 00000000018032c0 [ 459.982019] R10: 0000000000000000 R11: 0000000000000286 R12: 000000c420309bf8 [ 459.989375] R13: 0000000000000001 R14: 000000c42aa69260 R15: 0000000000000001 [ 460.010104] Mem-Info: [ 460.012580] active_anon:124885 inactive_anon:197 isolated_anon:0 [ 460.012580] active_file:33 inactive_file:45 isolated_file:0 [ 460.012580] unevictable:0 dirty:0 writeback:0 unstable:0 [ 460.012580] slab_reclaimable:10720 slab_unreclaimable:1379429 [ 460.012580] mapped:52236 shmem:245 pagetables:923 bounce:0 [ 460.012580] free:17052 free_pcp:95 free_cma:0 [ 460.046771] Node 0 active_anon:499500kB inactive_anon:788kB active_file:52kB inactive_file:92kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 421888kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 460.074441] Node 1 active_anon:40kB inactive_anon:0kB active_file:80kB inactive_file:88kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:40kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 460.109854] Node 0 DMA free:10312kB min:220kB low:272kB high:324kB active_anon:4096kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 460.143211] lowmem_reserve[]: 0 2555 2557 2557 [ 460.147938] Node 0 DMA32 free:15456kB min:36248kB low:45308kB high:54368kB active_anon:495404kB inactive_anon:788kB active_file:256kB inactive_file:192kB unevictable:0kB writepending:0kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:7104kB pagetables:3692kB bounce:0kB free_pcp:52kB local_pcp:0kB free_cma:0kB [ 460.178699] lowmem_reserve[]: 0 0 2 2 [ 460.182547] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 460.215196] lowmem_reserve[]: 0 0 0 0 [ 460.222887] Node 1 Normal free:41296kB min:53608kB low:67008kB high:80408kB active_anon:40kB inactive_anon:0kB active_file:80kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:24kB local_pcp:0kB free_cma:0kB [ 460.257079] lowmem_reserve[]: 0 0 0 0 [ 460.277493] Node 0 DMA: 0*4kB 1*8kB (U) 0*16kB 0*32kB 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10312kB [ 460.290225] Node 0 DMA32: 711*4kB (UME) 470*8kB (UME) 164*16kB (UME) 84*32kB (UM) 24*64kB (UM) 0*128kB 1*256kB (U) 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 14732kB [ 460.305400] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 460.317250] Node 1 Normal: 3*4kB (UME) 4*8kB (UME) 1*16kB (M) 4*32kB (ME) 1*64kB (M) 2*128kB (UE) 2*256kB (UM) 3*512kB (ME) 3*1024kB (UM) 1*2048kB (E) 8*4096kB (M) = 40444kB [ 460.333311] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 460.344243] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 460.352903] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 460.368338] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 460.376941] 314 total pagecache pages [ 460.383023] 0 pages in swap cache [ 460.386494] Swap cache stats: add 0, delete 0, find 0/0 [ 460.392263] Free swap = 0kB [ 460.395277] Total swap = 0kB [ 460.410019] 1965979 pages RAM [ 460.413333] 0 pages HighMem/MovableOnly [ 460.417302] 338856 pages reserved [ 460.426310] 0 pages cma reserved [ 460.452033] Unreclaimable slab info: [ 460.456133] Name Used Total [ 460.477721] pid_2 2KB 56KB [ 460.483210] batadv_tt_change_cache 2KB 7KB [ 460.489069] batadv_tl_cache 4KB 12KB [ 460.494461] TIPC 10KB 14KB [ 460.500279] SCTPv6 14KB 18KB [ 460.505663] DCCPv6 17KB 21KB [ 460.511286] DCCP 16KB 20KB [ 460.516786] bridge_fdb_cache 9KB 11KB [ 460.522214] fib6_nodes 100KB 104KB [ 460.527623] ip6_dst_cache 143KB 258KB [ 460.532996] RAWv6 68KB 78KB [ 460.538479] UDPv6 3KB 3KB [ 460.543849] TCPv6 23KB 29KB [ 460.550831] nf_conntrack 2KB 18KB [ 460.556535] sd_ext_cdb 0KB 7KB [ 460.562075] scsi_sense_cache 1056KB 1064KB [ 460.580593] virtio_scsi_cmd 16KB 16KB [ 460.586014] sgpool-128 8KB 8KB [ 460.594991] sgpool-64 4KB 12KB [ 460.600568] sgpool-32 2KB 15KB [ 460.606027] sgpool-16 1KB 7KB [ 460.624533] sgpool-8 0KB 7KB [ 460.633177] mqueue_inode_cache 10KB 21KB [ 460.638928] bio_post_read_ctx 14KB 15KB [ 460.644390] bio-2 14KB 15KB [ 460.663003] jfs_mp 7KB 7KB [ 460.671838] nfs_commit_data 3KB 14KB [ 460.677236] nfs_write_data 34KB 44KB [ 460.682768] ext4_system_zone 1KB 7KB [ 460.701022] bio-1 1KB 7KB [ 460.706420] pid_namespace 2KB 7KB [ 460.715273] rpc_buffers 17KB 25KB [ 460.720818] rpc_tasks 2KB 7KB [ 460.726545] UNIX 14KB 25KB [ 460.744931] tcp_bind_bucket 1KB 4KB [ 460.753566] inet_peer_cache 0KB 4KB [ 460.759103] xfrm_state 5KB 12KB [ 460.764480] ip_fib_trie 15KB 19KB [ 460.784166] ip_fib_alias 71KB 75KB [ 460.789635] ip_dst_cache 4KB 44KB [ 460.795012] RAW 40KB 50KB [ 460.813960] UDP 16KB 26KB [ 460.819502] TCP 8KB 16KB [ 460.824889] hugetlbfs_inode_cache 2KB 7KB [ 460.840300] fscache_cookie_jar 1KB 7KB [ 460.845793] eventpoll_pwq 2KB 19KB [ 460.865150] eventpoll_epi 5KB 23KB [ 460.870632] inotify_inode_mark 7KB 23KB [ 460.876089] request_queue 164KB 164KB [ 460.889574] blkdev_requests 1KB 3KB [ 460.894971] blkdev_ioc 8KB 23KB [ 460.913723] bio-0 54KB 67KB [ 460.921915] biovec-max 1105KB 1105KB [ 460.927298] biovec-64 6KB 7KB [ 460.932728] bio_integrity_payload 1KB 8KB [ 460.951133] khugepaged_mm_slot 0KB 15KB [ 460.956668] dmaengine-unmap-256 2KB 6KB [ 460.965636] dmaengine-unmap-128 1KB 3KB [ 460.971244] dmaengine-unmap-16 0KB 4KB [ 460.976701] dmaengine-unmap-2 0KB 3KB [ 460.994706] audit_buffer 0KB 3KB [ 461.003638] skbuff_fclone_cache 35KB 45KB [ 461.009247] skbuff_head_cache 1690982KB 1690983KB [ 461.014615] configfs_dir_cache 0KB 8KB [ 461.032920] file_lock_cache 0KB 3KB [ 461.041779] file_lock_ctx 0KB 3KB [ 461.048362] fsnotify_mark_connector 4KB 27KB [ 461.054275] net_namespace 52KB 52KB [ 461.072773] shmem_inode_cache 4505KB 4594KB [ 461.081410] task_delay_info 38KB 217KB [ 461.086879] taskstats 1KB 11KB [ 461.092439] proc_dir_entry 610KB 618KB [ 461.112096] pde_opener 0KB 3KB [ 461.120871] sigqueue 0KB 3KB [ 461.126253] kernfs_node_cache 13599KB 13608KB [ 461.132141] mnt_cache 81KB 92KB [ 461.156071] filp 273KB 678KB [ 461.161814] names_cache 365KB 365KB [ 461.167394] iint_cache 80KB 83KB [ 461.184337] hashtab_node 118KB 119KB [ 461.200973] ebitmap_node 374KB 378KB [ 461.206404] avtab_node 1012KB 1013KB [ 461.224425] avc_node 50KB 63KB [ 461.229893] selinux_file_security 14KB 282KB [ 461.235693] selinux_inode_security 2839KB 3376KB [ 461.251680] key_jar 4KB 7KB [ 461.257111] uts_namespace 2KB 7KB [ 461.277043] nsproxy 1KB 3KB [ 461.282527] vm_area_struct 358KB 831KB [ 461.298107] mm_struct 50KB 104KB [ 461.303800] fs_cache 8KB 64KB [ 461.316147] files_cache 30KB 71KB [ 461.333932] signal_cache 293KB 654KB [ 461.339539] sighand_cache 471KB 555KB [ 461.345030] task_struct 1336KB 1336KB [ 461.369572] cred_jar 62KB 408KB [ 461.375004] anon_vma_chain 107KB 350KB [ 461.392715] anon_vma 147KB 708KB [ 461.418839] pid 26KB 176KB [ 461.424255] Acpi-Operand 156KB 190KB [ 461.441325] Acpi-ParseExt 8KB 11KB [ 461.446757] Acpi-Parse 41KB 47KB [ 461.472582] Acpi-State 52KB 63KB [ 461.487545] Acpi-Namespace 21KB 23KB [ 461.492949] numa_policy 0KB 3KB [ 461.516446] debug_objects_cache 1015KB 1192KB [ 461.522086] trace_event_file 263KB 266KB [ 461.538021] ftrace_event_field 382KB 385KB [ 461.543507] pool_workqueue 87KB 88KB [ 461.558494] task_group 5KB 7KB [ 461.563897] page->ptl 95KB 604KB [ 461.575709] kmalloc-2097152 2050KB 2050KB [ 461.591000] kmalloc-524288 2056KB 2056KB [ 461.596498] kmalloc-262144 1290KB 1290KB [ 461.601924] kmalloc-131072 650KB 650KB [ 461.607304] kmalloc-65536 1914KB 1980KB [ 461.625735] kmalloc-32768 1617KB 1617KB [ 461.634868] kmalloc-16384 594KB 643KB [ 461.640595] kmalloc-8192 2244KB 2285KB [ 461.646228] kmalloc-4096 8869KB 8869KB [ 461.670278] kmalloc-2048 7554KB 8893KB [ 461.675699] kmalloc-1024 4132KB 7008KB [ 461.696631] kmalloc-512 3385763KB 3385766KB [ 461.705306] kmalloc-256 3001KB 3405KB [ 461.735238] kmalloc-128 606KB 921KB [ 461.746483] kmalloc-96 791KB 1224KB [ 461.791101] kmalloc-64 1955KB 2644KB [ 461.796523] kmalloc-32 2508KB 3319KB [ 461.817776] kmalloc-192 1483KB 1756KB [ 461.823537] kmem_cache 254KB 262KB [ 461.849365] Out of memory: Kill process 9965 (syz-executor.4) score 1005 or sacrifice child [ 461.874787] Killed process 9965 (syz-executor.4) total-vm:73104kB, anon-rss:4272kB, file-rss:34816kB, shmem-rss:0kB [ 461.919871] init invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 461.954450] init cpuset=/ mems_allowed=0-1 [ 461.958795] CPU: 1 PID: 1 Comm: init Not tainted 4.19.76 #0 [ 461.964507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.973864] Call Trace: [ 461.976472] dump_stack+0x172/0x1f0 [ 461.980120] dump_header+0x15e/0xa55 [ 461.983845] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 461.988974] ? ___ratelimit+0x60/0x595 [ 461.992871] ? do_raw_spin_unlock+0x57/0x270 [ 461.997291] oom_kill_process.cold+0x10/0x6ef [ 462.001796] ? lock_downgrade+0x880/0x880 [ 462.005979] ? kasan_check_read+0x11/0x20 [ 462.010148] out_of_memory+0x936/0x12d0 [ 462.014137] ? oom_killer_disable+0x280/0x280 [ 462.018648] ? mutex_trylock+0x18e/0x1e0 [ 462.022722] ? __alloc_pages_slowpath+0xcc2/0x2870 [ 462.027753] __alloc_pages_slowpath+0x20af/0x2870 [ 462.032622] ? warn_alloc+0x110/0x110 [ 462.036428] ? __lock_is_held+0xb6/0x140 [ 462.040505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 462.046045] ? should_fail+0x14d/0x85c [ 462.049951] ? __might_sleep+0x95/0x190 [ 462.053934] __alloc_pages_nodemask+0x617/0x750 [ 462.058645] ? kasan_check_read+0x11/0x20 [ 462.063065] ? __alloc_pages_slowpath+0x2870/0x2870 [ 462.068092] ? find_get_entry+0x3e8/0x820 [ 462.072343] ? filemap_map_pages+0x1130/0x1130 [ 462.077025] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 462.082667] alloc_pages_current+0x107/0x210 [ 462.087440] __page_cache_alloc+0x2bd/0x450 [ 462.091768] ? kasan_check_read+0x11/0x20 [ 462.095925] filemap_fault+0x10bb/0x2250 [ 462.100002] ? lock_downgrade+0x880/0x880 [ 462.104187] ? __lock_page_or_retry+0xdc0/0xdc0 [ 462.112113] ? lock_acquire+0x16f/0x3f0 [ 462.116103] ? ext4_filemap_fault+0x7b/0xaf [ 462.120453] ext4_filemap_fault+0x83/0xaf [ 462.124614] __do_fault+0x111/0x480 [ 462.128270] __handle_mm_fault+0x2d78/0x3f80 [ 462.132962] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 462.137833] ? count_memcg_event_mm+0x2b1/0x4d0 [ 462.142524] handle_mm_fault+0x1b5/0x690 [ 462.146604] __do_page_fault+0x62a/0xe90 [ 462.150681] ? vmalloc_fault+0x740/0x740 [ 462.154750] ? trace_hardirqs_off_caller+0x65/0x220 [ 462.160032] ? trace_hardirqs_on_caller+0x6a/0x220 [ 462.165054] ? page_fault+0x8/0x30 [ 462.168613] do_page_fault+0x71/0x57d [ 462.172421] ? page_fault+0x8/0x30 [ 462.175983] page_fault+0x1e/0x30 [ 462.179440] RIP: 0033:0x7f8dad610dd3 [ 462.183165] Code: Bad RIP value. [ 462.186530] RSP: 002b:00007ffef11a6f18 EFLAGS: 00010246 [ 462.191985] RAX: 0000000000000000 RBX: 00007ffef11a70c0 RCX: 00007f8dad610dd3 [ 462.199292] RDX: 0000000000000000 RSI: 00007ffef11a7270 RDI: 000000000000000b [ 462.206567] RBP: 00007ffef11a7270 R08: 00007ffef11a72f0 R09: 0000000000000001 [ 462.213845] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 462.221214] R13: 00007ffef11a7650 R14: 0000000000000000 R15: 0000000000000000 [ 462.573101] Mem-Info: [ 462.575690] active_anon:123823 inactive_anon:197 isolated_anon:0 [ 462.575690] active_file:17 inactive_file:246 isolated_file:0 [ 462.575690] unevictable:0 dirty:5 writeback:0 unstable:0 [ 462.575690] slab_reclaimable:10720 slab_unreclaimable:1367049 [ 462.575690] mapped:52350 shmem:245 pagetables:896 bounce:0 [ 462.575690] free:29465 free_pcp:653 free_cma:0 [ 462.627164] Node 0 active_anon:495252kB inactive_anon:788kB active_file:204kB inactive_file:1288kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:209656kB dirty:12kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 417792kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 462.662670] Node 1 active_anon:40kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 462.694763] Node 0 DMA free:10312kB min:220kB low:272kB high:324kB active_anon:4096kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 462.726356] lowmem_reserve[]: 0 2555 2557 2557 [ 462.731065] Node 0 DMA32 free:116324kB min:36248kB low:45308kB high:54368kB active_anon:491156kB inactive_anon:788kB active_file:204kB inactive_file:2016kB unevictable:0kB writepending:12kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:7104kB pagetables:3584kB bounce:0kB free_pcp:2756kB local_pcp:1496kB free_cma:0kB [ 462.766212] lowmem_reserve[]: 0 0 2 2 [ 462.775034] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 462.856979] lowmem_reserve[]: 0 0 0 0 [ 462.860965] Node 1 Normal free:27424kB min:53608kB low:67008kB high:80408kB active_anon:40kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:4kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 462.901659] lowmem_reserve[]: 0 0 0 0 [ 462.915240] Node 0 DMA: 0*4kB 1*8kB (U) 0*16kB 0*32kB 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10312kB [ 462.932091] Node 0 DMA32: 1611*4kB (UME) 2468*8kB (UME) 360*16kB (UME) 230*32kB (UM) 161*64kB (UM) 125*128kB (U) 88*256kB (U) 51*512kB (U) 31*1024kB (U) 15*2048kB (UM) 6*4096kB (U) = 201292kB [ 462.959530] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 462.986166] Node 1 Normal: 2*4kB (ME) 5*8kB (UME) 3*16kB (UM) 6*32kB (UME) 2*64kB (UM) 1*128kB (E) 1*256kB (M) 4*512kB (UME) 2*1024kB (M) 1*2048kB (E) 5*4096kB (M) = 27424kB [ 463.011555] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 463.036164] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 463.054466] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 463.073181] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 463.117481] 1530 total pagecache pages [ 463.121413] 0 pages in swap cache [ 463.124864] Swap cache stats: add 0, delete 0, find 0/0 [ 463.147462] Free swap = 0kB [ 463.150517] Total swap = 0kB [ 463.153626] 1965979 pages RAM [ 463.156729] 0 pages HighMem/MovableOnly [ 463.177472] 338856 pages reserved [ 463.180957] 0 pages cma reserved [ 463.184505] Unreclaimable slab info: [ 463.207465] Name Used Total [ 463.213110] pid_2 2KB 56KB [ 463.237567] batadv_tt_change_cache 2KB 7KB [ 463.243451] batadv_tl_cache 4KB 12KB [ 463.253067] TIPC 10KB 14KB [ 463.265915] SCTPv6 14KB 18KB [ 463.282809] DCCPv6 17KB 21KB [ 463.296615] DCCP 16KB 20KB [ 463.305108] bridge_fdb_cache 9KB 11KB [ 463.320163] fib6_nodes 100KB 104KB [ 463.335112] ip6_dst_cache 143KB 258KB [ 463.372715] RAWv6 68KB 78KB [ 463.383205] UDPv6 3KB 3KB [ 463.394416] TCPv6 23KB 29KB [ 463.399888] nf_conntrack 2KB 18KB [ 463.405442] sd_ext_cdb 0KB 7KB [ 463.420389] scsi_sense_cache 1056KB 1064KB [ 463.427531] virtio_scsi_cmd 16KB 16KB [ 463.437479] sgpool-128 8KB 8KB [ 463.448887] sgpool-64 4KB 12KB [ 463.454669] sgpool-32 2KB 15KB [ 463.460206] sgpool-16 1KB 7KB [ 463.465975] sgpool-8 0KB 7KB [ 463.477777] mqueue_inode_cache 10KB 21KB [ 463.487514] bio_post_read_ctx 14KB 15KB [ 463.495860] bio-2 14KB 15KB [ 463.506786] jfs_mp 7KB 7KB [ 463.512498] nfs_commit_data 3KB 14KB [ 463.518182] nfs_write_data 34KB 44KB [ 463.523600] ext4_system_zone 1KB 7KB [ 463.529180] bio-1 1KB 7KB [ 463.534834] pid_namespace 2KB 7KB [ 463.545724] rpc_buffers 17KB 25KB [ 463.551893] rpc_tasks 2KB 7KB [ 463.557609] UNIX 14KB 25KB [ 463.562992] tcp_bind_bucket 1KB 4KB [ 463.568429] inet_peer_cache 0KB 4KB [ 463.577625] xfrm_state 5KB 12KB [ 463.583017] ip_fib_trie 15KB 19KB [ 463.590417] ip_fib_alias 71KB 75KB [ 463.600901] ip_dst_cache 4KB 44KB [ 463.606310] RAW 40KB 50KB [ 463.611762] UDP 16KB 26KB [ 463.627822] TCP 8KB 16KB [ 463.633522] hugetlbfs_inode_cache 2KB 7KB [ 463.639317] fscache_cookie_jar 1KB 7KB [ 463.645502] eventpoll_pwq 2KB 19KB [ 463.657000] eventpoll_epi 5KB 23KB [ 463.667697] inotify_inode_mark 7KB 23KB [ 463.673627] request_queue 164KB 164KB [ 463.679822] blkdev_requests 1KB 3KB [ 463.690388] blkdev_ioc 13KB 23KB [ 463.695822] bio-0 85KB 86KB [ 463.701384] biovec-max 1105KB 1105KB [ 463.712519] biovec-64 93KB 94KB [ 463.717978] biovec-16 7KB 7KB [ 463.723349] bio_integrity_payload 1KB 8KB [ 463.729399] khugepaged_mm_slot 0KB 15KB [ 463.735048] dmaengine-unmap-256 2KB 6KB [ 463.740658] dmaengine-unmap-128 1KB 3KB [ 463.754045] dmaengine-unmap-16 0KB 4KB [ 463.759631] dmaengine-unmap-2 0KB 3KB [ 463.771014] audit_buffer 0KB 3KB [ 463.781435] skbuff_fclone_cache 41KB 41KB [ 463.787301] skbuff_head_cache 1553238KB 1554941KB [ 463.792880] configfs_dir_cache 0KB 8KB [ 463.798633] file_lock_cache 0KB 3KB [ 463.804095] file_lock_ctx 0KB 3KB [ 463.810340] fsnotify_mark_connector 4KB 27KB [ 463.822187] net_namespace 52KB 52KB [ 463.835408] shmem_inode_cache 4505KB 4594KB [ 463.850918] task_delay_info 38KB 217KB [ 463.856509] taskstats 1KB 11KB [ 463.872402] proc_dir_entry 610KB 618KB [ 463.883208] pde_opener 0KB 3KB [ 463.907476] sigqueue 0KB 3KB [ 463.912883] kernfs_node_cache 13598KB 13608KB [ 463.933357] mnt_cache 81KB 92KB [ 463.939716] filp 273KB 678KB [ 463.950470] names_cache 365KB 365KB [ 463.955872] iint_cache 80KB 83KB [ 463.961320] hashtab_node 118KB 119KB [ 463.966794] ebitmap_node 374KB 378KB [ 463.972284] avtab_node 1012KB 1013KB [ 463.999485] avc_node 50KB 63KB [ 464.004915] selinux_file_security 14KB 282KB [ 464.027499] selinux_inode_security 2839KB 3376KB [ 464.033346] key_jar 4KB 7KB [ 464.043493] uts_namespace 2KB 7KB [ 464.053408] nsproxy 1KB 3KB [ 464.072609] vm_area_struct 358KB 831KB [ 464.092778] mm_struct 50KB 104KB [ 464.098742] fs_cache 8KB 64KB [ 464.109272] files_cache 30KB 71KB [ 464.121936] signal_cache 293KB 654KB [ 464.127352] sighand_cache 471KB 555KB [ 464.137174] task_struct 1336KB 1336KB [ 464.147115] cred_jar 62KB 408KB [ 464.156919] anon_vma_chain 107KB 350KB [ 464.166560] anon_vma 147KB 708KB [ 464.176199] pid 26KB 176KB [ 464.185828] Acpi-Operand 156KB 190KB [ 464.195562] Acpi-ParseExt 8KB 11KB [ 464.206112] Acpi-Parse 41KB 47KB [ 464.215874] Acpi-State 52KB 63KB [ 464.225462] Acpi-Namespace 21KB 23KB [ 464.236106] numa_policy 0KB 3KB [ 464.245646] debug_objects_cache 1014KB 1192KB [ 464.255637] trace_event_file 263KB 266KB [ 464.265385] ftrace_event_field 382KB 385KB [ 464.275170] pool_workqueue 87KB 88KB [ 464.284708] task_group 5KB 7KB [ 464.294467] page->ptl 95KB 604KB [ 464.307779] kmalloc-2097152 2050KB 2050KB [ 464.314369] kmalloc-524288 2056KB 2056KB [ 464.323713] kmalloc-262144 1290KB 1290KB [ 464.336071] kmalloc-131072 650KB 650KB [ 464.346056] kmalloc-65536 1914KB 1980KB [ 464.367591] kmalloc-32768 1617KB 1617KB [ 464.373126] kmalloc-16384 594KB 643KB [ 464.397576] kmalloc-8192 2244KB 2285KB [ 464.403180] kmalloc-4096 8899KB 8899KB [ 464.432541] kmalloc-2048 7605KB 8893KB [ 464.438151] kmalloc-1024 4253KB 7008KB [ 464.443617] kmalloc-512 2931166KB 2933310KB [ 464.472453] kmalloc-256 3011KB 3405KB [ 464.478181] kmalloc-128 609KB 921KB [ 464.483680] kmalloc-96 806KB 1224KB [ 464.525327] kmalloc-64 1959KB 2644KB [ 464.535828] kmalloc-32 2515KB 3319KB [ 464.541552] kmalloc-192 1498KB 1756KB [ 464.546926] kmem_cache 254KB 262KB [ 464.571767] Out of memory: Kill process 10104 (syz-executor.4) score 1005 or sacrifice child [ 464.608361] Killed process 10104 (syz-executor.4) total-vm:72972kB, anon-rss:4264kB, file-rss:34816kB, shmem-rss:0kB 02:05:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) 02:05:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) poll(&(0x7f0000000040)=[{r0, 0x1040}], 0x1, 0x0) 02:05:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:05:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) socketpair(0xa, 0x80a, 0xd01, &(0x7f0000000340)) 02:05:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:05:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) 02:05:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) 02:05:09 executing program 1: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000800)=ANY=[], 0x46d) open(0x0, 0x200c2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) [ 471.790621] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 471.883772] SELinux: failed to load policy [ 471.907013] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 472.082271] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 472.110417] device bridge_slave_1 left promiscuous mode [ 472.118802] SELinux: failed to load policy [ 472.135330] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.209771] device bridge_slave_0 left promiscuous mode [ 472.227828] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.361851] device hsr_slave_1 left promiscuous mode [ 472.432190] device hsr_slave_0 left promiscuous mode 02:05:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) 02:05:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmmsg$sock(r0, &(0x7f0000001ec0)=[{{&(0x7f0000000040)=@sco, 0x80, 0x0}}], 0x1, 0x20000000) 02:05:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) [ 472.492896] team0 (unregistering): Port device team_slave_1 removed [ 472.510743] team0 (unregistering): Port device team_slave_0 removed [ 472.522729] bond0 (unregistering): Releasing backup interface bond_slave_1 02:05:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) recvmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffffffffffd37, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 02:05:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:05:10 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5382, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x7]}) 02:05:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) [ 472.659368] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 472.748687] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 02:05:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000070a07031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 02:05:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) [ 472.939230] bond0 (unregistering): Released all slaves [ 474.763002] IPVS: ftp: loaded support on port[0] = 21 [ 474.824069] chnl_net:caif_netlink_parms(): no params data found [ 474.854082] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.861333] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.868917] device bridge_slave_0 entered promiscuous mode [ 474.875796] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.882425] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.889523] device bridge_slave_1 entered promiscuous mode [ 474.906362] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 474.915855] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 474.932952] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 474.940673] team0: Port device team_slave_0 added [ 474.946441] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 474.953952] team0: Port device team_slave_1 added [ 474.959397] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 474.967776] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 475.049388] device hsr_slave_0 entered promiscuous mode [ 475.097986] device hsr_slave_1 entered promiscuous mode [ 475.138076] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 475.145216] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 475.158680] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.165061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 475.171983] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.178402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 475.211741] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 475.218132] 8021q: adding VLAN 0 to HW filter on device bond0 [ 475.226272] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 475.235213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 475.244295] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.251431] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.258817] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 475.269139] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 475.275382] 8021q: adding VLAN 0 to HW filter on device team0 [ 475.285933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 475.293691] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.300085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 475.310185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 475.318130] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.324566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 475.342219] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 475.350441] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 475.366129] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 475.378592] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 475.389631] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 475.396568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 475.405258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 475.412972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 475.420781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 475.433045] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 475.444638] 8021q: adding VLAN 0 to HW filter on device batadv0 02:05:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000080)="66b829018ec0b9800000c00f3235002000000f3066baf80cb8c8f61a8eef66bafc0ced0f787e0036400fc75a00c4e1f9e601c4018575504f0f87d485a71b64440f01c43e662666470f38804185", 0x4d}], 0x1, 0x0, 0x0, 0xfffffffffffffe96) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) io_submit(0x0, 0x1, &(0x7f0000001780)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$KVM_RUN(r6, 0xae80, 0x0) 02:05:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:05:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) 02:05:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:05:13 executing program 1: 02:05:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) recvmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffffffffffd37, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 02:05:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 02:05:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 02:05:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 02:05:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) [ 475.794754] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 475.813805] ================================================================== [ 475.817590] protocol 88fb is buggy, dev hsr_slave_0 [ 475.821669] BUG: KASAN: null-ptr-deref in kvm_write_guest_virt_system+0x64/0x90 [ 475.821690] Write of size 24 at addr 0000000000000000 by task syz-executor.3/11197 [ 475.827066] protocol 88fb is buggy, dev hsr_slave_1 [ 475.834417] [ 475.834439] CPU: 0 PID: 11197 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 475.834447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.834452] Call Trace: [ 475.834483] dump_stack+0x172/0x1f0 [ 475.834508] ? kvm_write_guest_virt_system+0x64/0x90 [ 475.834598] kasan_report.cold+0x199/0x2ba [ 475.834620] check_memory_region+0x123/0x190 [ 475.885445] memset+0x24/0x40 [ 475.888557] kvm_write_guest_virt_system+0x64/0x90 [ 475.893664] handle_vmread+0x7fe/0xa10 [ 475.897549] ? handle_invpcid+0xa80/0xa80 [ 475.901875] ? __lock_is_held+0xb6/0x140 [ 475.905939] ? __lock_is_held+0xb6/0x140 [ 475.910347] ? handle_invpcid+0xa80/0xa80 [ 475.914526] vmx_handle_exit+0x276/0x16b0 [ 475.918766] ? lock_acquire+0x16f/0x3f0 [ 475.922786] ? vcpu_enter_guest+0xf15/0x5ed0 [ 475.927203] vcpu_enter_guest+0x10ca/0x5ed0 [ 475.931549] ? kvm_vcpu_ioctl+0x181/0xf90 [ 475.935693] ? emulator_read_emulated+0x50/0x50 [ 475.940354] ? lock_acquire+0x16f/0x3f0 [ 475.944320] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 475.949764] kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 475.954605] ? kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 475.959804] kvm_vcpu_ioctl+0x4dc/0xf90 [ 475.963785] ? kvm_vcpu_block+0xcc0/0xcc0 [ 475.967930] ? mark_held_locks+0x100/0x100 [ 475.972170] ? __might_fault+0x12b/0x1e0 [ 475.976281] ? __fget+0x340/0x540 [ 475.979816] ? find_held_lock+0x35/0x130 [ 475.983955] ? __fget+0x340/0x540 [ 475.987404] ? kvm_vcpu_block+0xcc0/0xcc0 [ 475.991601] do_vfs_ioctl+0xd5f/0x1380 [ 475.995492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.001151] ? selinux_file_ioctl+0x125/0x5e0 [ 476.005902] ? ioctl_preallocate+0x210/0x210 [ 476.010385] ? selinux_file_mprotect+0x620/0x620 [ 476.015136] ? iterate_fd+0x360/0x360 [ 476.020022] ? nsecs_to_jiffies+0x30/0x30 [ 476.024170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.029734] ? security_file_ioctl+0x8d/0xc0 [ 476.034137] ksys_ioctl+0xab/0xd0 [ 476.037584] __x64_sys_ioctl+0x73/0xb0 [ 476.041487] do_syscall_64+0xfd/0x620 [ 476.045301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.050490] RIP: 0033:0x459a29 [ 476.053674] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.072575] RSP: 002b:00007f14a47e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 476.080289] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 476.088246] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000008 02:05:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) [ 476.095517] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 476.103039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f14a47e86d4 [ 476.110321] R13: 00000000004c2ddb R14: 00000000004d68f8 R15: 00000000ffffffff [ 476.118314] ================================================================== [ 476.125789] Disabling lock debugging due to kernel taint [ 476.131910] protocol 88fb is buggy, dev hsr_slave_0 02:05:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="baeeff02000000c812b2727500000000000000000000003df1115afb4ae42849436b6a00"/45], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x23, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, 0x0, 0x3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x1, 0x4, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) r7 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r11 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f0000000140)={r8, r10}) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088470dffffff00004000048477fbac141414e9", 0x0}, 0x28) r13 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x3ad, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f21531d200050024584f315f110900000000f0b906de559a0877e618767627", 0x216}], 0x1, 0x0, 0x23a}, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) recvmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffffffffffd37, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) [ 476.247260] Kernel panic - not syncing: panic_on_warn set ... [ 476.247260] [ 476.254692] CPU: 0 PID: 11197 Comm: syz-executor.3 Tainted: G B 4.19.76 #0 [ 476.263014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.272554] Call Trace: [ 476.275177] dump_stack+0x172/0x1f0 [ 476.279046] ? kvm_write_guest_virt_system+0x64/0x90 [ 476.284766] panic+0x263/0x507 [ 476.287958] ? __warn_printk+0xf3/0xf3 [ 476.291852] ? kvm_write_guest_virt_system+0x64/0x90 [ 476.296963] ? preempt_schedule+0x4b/0x60 [ 476.301120] ? ___preempt_schedule+0x16/0x18 [ 476.305701] ? trace_hardirqs_on+0x5e/0x220 [ 476.310017] ? kvm_write_guest_virt_system+0x64/0x90 [ 476.315157] kasan_end_report+0x47/0x4f [ 476.319409] kasan_report.cold+0xa9/0x2ba [ 476.326641] check_memory_region+0x123/0x190 [ 476.331052] memset+0x24/0x40 [ 476.334326] kvm_write_guest_virt_system+0x64/0x90 [ 476.339260] handle_vmread+0x7fe/0xa10 [ 476.343137] ? handle_invpcid+0xa80/0xa80 [ 476.347283] ? __lock_is_held+0xb6/0x140 [ 476.351337] ? __lock_is_held+0xb6/0x140 [ 476.355758] ? handle_invpcid+0xa80/0xa80 [ 476.359992] vmx_handle_exit+0x276/0x16b0 [ 476.364788] ? lock_acquire+0x16f/0x3f0 [ 476.369020] ? vcpu_enter_guest+0xf15/0x5ed0 [ 476.373450] vcpu_enter_guest+0x10ca/0x5ed0 [ 476.377782] ? kvm_vcpu_ioctl+0x181/0xf90 [ 476.381928] ? emulator_read_emulated+0x50/0x50 [ 476.386594] ? lock_acquire+0x16f/0x3f0 [ 476.390559] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 476.396002] kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 476.400832] ? kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 476.405928] kvm_vcpu_ioctl+0x4dc/0xf90 [ 476.409889] ? kvm_vcpu_block+0xcc0/0xcc0 [ 476.415151] ? mark_held_locks+0x100/0x100 [ 476.419377] ? __might_fault+0x12b/0x1e0 [ 476.423687] ? __fget+0x340/0x540 [ 476.427160] ? find_held_lock+0x35/0x130 [ 476.431926] ? __fget+0x340/0x540 [ 476.435390] ? kvm_vcpu_block+0xcc0/0xcc0 [ 476.439622] do_vfs_ioctl+0xd5f/0x1380 [ 476.443538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.449251] ? selinux_file_ioctl+0x125/0x5e0 [ 476.454190] ? ioctl_preallocate+0x210/0x210 [ 476.458827] ? selinux_file_mprotect+0x620/0x620 [ 476.463662] ? iterate_fd+0x360/0x360 [ 476.467474] ? nsecs_to_jiffies+0x30/0x30 [ 476.471676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.477317] ? security_file_ioctl+0x8d/0xc0 [ 476.482029] ksys_ioctl+0xab/0xd0 [ 476.485484] __x64_sys_ioctl+0x73/0xb0 [ 476.489374] do_syscall_64+0xfd/0x620 [ 476.493166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.498343] RIP: 0033:0x459a29 [ 476.501524] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.521388] RSP: 002b:00007f14a47e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 476.529188] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 476.536483] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000008 [ 476.543754] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 476.551014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f14a47e86d4 [ 476.558414] R13: 00000000004c2ddb R14: 00000000004d68f8 R15: 00000000ffffffff [ 476.568084] Kernel Offset: disabled [ 476.571816] Rebooting in 86400 seconds..