rogram 3: r0 = syz_open_dev$video(0x0, 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x2, 0x9, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:21 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000), 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(&(0x7f0000000000), 0x86, 0x0, 0x0, 0x0, 0x0) 15:44:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000000000000000060cdb94540081100fe880000000000000000000000000001ff0200000000000000000000000000010000000000089078"], 0xfdef) 15:44:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:22 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000), 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(&(0x7f0000000000), 0x86, 0x0, 0x0, 0x0, 0x0) 15:44:22 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x2, 0x9, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:22 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000), 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(&(0x7f0000000000), 0x86, 0x0, 0x0, 0x0, 0x0) 15:44:22 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x2, 0x9, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:23 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137", 0x21}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:23 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(0x0, &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {}, [{}]}, 0x2c, 0x0) 15:44:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:23 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) futex(&(0x7f0000000000), 0x86, 0x0, 0x0, 0x0, 0x0) 15:44:23 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x2, 0x9, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:23 executing program 2: perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:44:23 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(0x0, &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {}, [{}]}, 0x2c, 0x0) 15:44:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:23 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) futex(&(0x7f0000000000), 0x86, 0x0, 0x0, 0x0, 0x0) 15:44:23 executing program 3: syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000000)={0x2, 0x9, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:24 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) futex(&(0x7f0000000000), 0x86, 0x0, 0x0, 0x0, 0x0) 15:44:24 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137", 0x21}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:24 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(0x0, &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {}, [{}]}, 0x2c, 0x0) 15:44:24 executing program 2: write$capi20(0xffffffffffffffff, &(0x7f00000001c0)={0x10}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x5, 0x7, 0x14, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040), 0x0}, 0x20) 15:44:24 executing program 3: syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000000)={0x2, 0x9, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:24 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(0x0, 0x86, 0x0, 0x0, 0x0, 0x0) 15:44:24 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000380)={{}, {}, [{}]}, 0x2c, 0x0) 15:44:24 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(0x0, 0x86, 0x0, 0x0, 0x0, 0x0) 15:44:24 executing program 3: syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000000)={0x2, 0x9, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:24 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000002c0), &(0x7f0000002600)=0x4) 15:44:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:25 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000380)={{}, {}, [{}]}, 0x2c, 0x0) 15:44:25 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:25 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(0x0, 0x86, 0x0, 0x0, 0x0, 0x0) 15:44:25 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, 0x0) 15:44:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:25 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x9, @raw_data="a3e9aa51de0c9acc42443130cd09fb8d0d383ec49b46b5dfcf06513bd1a74666414f70c0ed43929963dc48cd0d0355a23143777f8cc1a0eab52c5b8e7f154d9cdc15505c9a2b9fe914dc6bb3ac7c1a45c5528ebd34e2cfd35c3ba75403b54d5f4f0521e971dbb75b9be1791e34157ede123917cccc23512c23f0aee0e67127e3730f0370f5b1a0e19096612a57a4a8796cb52e6f80791546da5d9ca226dec4ebf58099014e1c7812ba058902496d2213db711331e3a3cbe492b6d707936ed1fbe72cdaabdba154ce"}) 15:44:25 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000380)={{}, {}, [{}]}, 0x2c, 0x0) 15:44:25 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0) 15:44:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:25 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0xa4d00, 0x0) 15:44:25 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, 0x0) 15:44:26 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 15:44:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b200080000001028e6c467144d2fa833"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000880)=@newtfilter={0x478, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x448, 0x2, [@TCA_BASIC_POLICE={0x444, 0x4, [@TCA_POLICE_RATE={0x404}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x7f, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}]}]}}]}, 0x478}}, 0x0) 15:44:26 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:26 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, 0x0) 15:44:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:26 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0) 15:44:26 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 15:44:27 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x0, 0x9, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:27 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0) 15:44:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:27 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000130009006900000000000000eb00804806000000c60001070000001419001300", 0x24}], 0x1) write(0xffffffffffffffff, &(0x7f0000000000)="24000000580001000000f4f9002304000a04f511080001", 0x17) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x18d, 0x0) 15:44:27 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 15:44:27 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x0, 0x9, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x400, 0x0, 0x1}, 0x3c) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 15:44:27 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x28}}, 0x0) 15:44:27 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000380), 0x24, 0x0) 15:44:27 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:27 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x0, 0x9, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:27 executing program 1: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000280)=ANY=[@ANYBLOB="dc000200", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001080000c80008809a3d008014000406000000007f00000199afbbdcd5bc7965080003000000000074000000200004000a000000000000000000000000000000000000000000000040000000240002002cae60f5dd0570bbf48bf233fba1a9b017538688b5095343e13f2c7be6c565a824000100bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbcbbbbbbbbbbbbbbbbbbbbbbbbbba906000500000000003000008024000100e0e9ffffa9aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa0800030001"], 0x3}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000029001f4d154a817393278bff0c80a57802000000000484001403", 0x1e, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000ee30001f00040004eb1b849ad502", 0x11, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="c9ae00001a", 0x5, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 426.024683][ T32] audit: type=1804 audit(1584287068.066:81): pid=17447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/118/bus" dev="sda1" ino=16881 res=1 15:44:28 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x2, 0x0, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) 15:44:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, 0x0, 0x0) [ 426.195809][T17488] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 426.204168][T17488] netlink: 43799 bytes leftover after parsing attributes in process `syz-executor.1'. 15:44:28 executing program 1: unshare(0x400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 15:44:28 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, 0x0, 0x0) 15:44:28 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x2, 0x0, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) [ 426.771021][ T32] audit: type=1804 audit(1584287068.826:82): pid=17569 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/119/bus" dev="sda1" ino=16881 res=1 15:44:29 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e37", 0x24}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 15:44:29 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000380), 0x24, 0x0) 15:44:29 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, 0x0, 0x0) 15:44:29 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x2, 0x0, 0x0, "68f2ef1f8a0cd0cd678fdf0000000000000a00"}) [ 427.336418][ T32] audit: type=1804 audit(1584287069.396:83): pid=17589 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/120/bus" dev="sda1" ino=17118 res=1 15:44:29 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:44:29 executing program 3: syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r0 = memfd_create(0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/514], 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) pwritev(r0, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000200)="ac89324dfd9a05b75dac8f8ae829b4b69d79dd85b12895f66d27b40fc034458023", 0x21, 0x4004040, 0x0, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000000)=""/215, &(0x7f0000000100)=0xd7) 15:44:29 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) unshare(0x20400) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, 0x0) 15:44:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:44:30 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) finit_module(r1, 0x0, 0x0) 15:44:30 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x1102004}}, 0x50) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000380), 0x24, 0x0) 15:44:30 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = dup2(r0, r1) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, 0x0, 0x0) 15:44:30 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e37", 0x24}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 428.395197][ T32] audit: type=1804 audit(1584287070.456:84): pid=17719 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/122/bus" dev="sda1" ino=16929 res=1 15:44:30 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) finit_module(r1, 0x0, 0x0) 15:44:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 15:44:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x2, 0x0, 0x300) 15:44:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 429.029323][ T32] audit: type=1804 audit(1584287071.086:85): pid=17734 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/123/bus" dev="sda1" ino=17135 res=1 15:44:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b00000000007e4754c2f0f4e06efab1350aff00000000000000035c8d63dd359a7a758587200be38d99ee431f24670097683c3ed4e599233cd981817cc50e04811611b75deb"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r0, r1}) 15:44:31 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) finit_module(r1, 0x0, 0x0) 15:44:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) [ 429.375632][ T32] audit: type=1804 audit(1584287071.436:86): pid=17744 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/124/bus" dev="sda1" ino=17127 res=1 15:44:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 15:44:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 15:44:32 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:32 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e37", 0x24}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x83, &(0x7f0000000340)={r2}, 0x8) 15:44:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 15:44:32 executing program 3: futex(0x0, 0xa, 0x0, 0x0, 0x0, 0x3) 15:44:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000600)=@newchain={0x24, 0x64, 0x3, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 15:44:32 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:44:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 15:44:32 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:32 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000180)="2649c2f51f20635ca4141ac5ccb6fda86a9b3b5bee0ad88e1fdad8a5f63efa410e906aa58006aaa1726a5a7f88904e0af6ac2ceb897c3f76d3e0a076324bb89f1ec163ca60599edb1de8a4fd6b668829173fea7fd2e0adcacb5944d3fe8a2889a100d9b84cb425ebb67d03da6008eb8bcb8e79a918981cb0cb39a60a9bc4619a3f1ea99690a03072b7d185a953c1f16ef6580c97380c5c16d29f6dacd62114fc18181db34cfa6aa82622fcfd8f3bec1b5d37d85e314e4d888ba6c723beddd613d11d9e7242a59435966e32673016eadad2", 0xd1}], 0x1, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cachefiles\x00', 0x400400, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x0) finit_module(r3, 0x0, 0x1) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f00000002c0)={0x3, r3}) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x3, 0x151200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000abe000)}, 0x24, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000000180)={{0x7fffffff, 0xb}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) getsockopt$rose(0xffffffffffffffff, 0x104, 0x6, &(0x7f0000000540), &(0x7f0000000580)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000480)={0x817a, 0x3, 0x0, 'queue0\x00', 0x4}) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x7}, &(0x7f0000000280)=0x8) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b7059b342623b372d82fefa01f9a2d830f7f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b315d", 0x3b7}], 0x1) 15:44:32 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:44:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84, 0x10}}, &(0x7f0000000180)='GPL\x00'}, 0x48) 15:44:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0], 0x2}}, 0x0) [ 430.839591][ T32] audit: type=1804 audit(1584287072.896:87): pid=17887 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/126/bus" dev="sda1" ino=17132 res=1 15:44:33 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:33 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:33 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:44:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x40}]}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x58}}, 0x0) 15:44:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0], 0x2}}, 0x0) 15:44:33 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000080)) [ 431.513753][ T32] audit: type=1804 audit(1584287073.576:88): pid=17906 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/127/bus" dev="sda1" ino=17138 res=1 15:44:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 15:44:33 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x14, r3, 0x1, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) 15:44:33 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0], 0x2}}, 0x0) 15:44:34 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) read(r0, 0x0, 0x0) [ 432.127104][ T32] audit: type=1804 audit(1584287074.186:89): pid=17927 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/128/bus" dev="sda1" ino=17165 res=1 15:44:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 15:44:34 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:34 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 15:44:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000000c0)={0x18, r1, 0x703, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0x18}}, 0x0) 15:44:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 15:44:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x19a) sendfile(r1, r2, 0x0, 0x7fffffff) [ 432.705231][ T32] audit: type=1804 audit(1584287074.766:90): pid=17948 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/129/bus" dev="sda1" ino=17167 res=1 15:44:34 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) 15:44:34 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 15:44:35 executing program 3: unshare(0x24020400) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="79f43700c98657920000000000000400"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r4, 0x0, 0x1}, 0xc) [ 433.158085][ T32] audit: type=1800 audit(1584287075.216:91): pid=17964 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17180 res=0 15:44:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) [ 433.212936][ T32] audit: type=1804 audit(1584287075.256:92): pid=17964 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir946537199/syzkaller.TVGGh9/91/file0/file0" dev="sda1" ino=17180 res=1 [ 433.241254][ T32] audit: type=1804 audit(1584287075.286:93): pid=17968 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/130/bus" dev="sda1" ino=17182 res=1 15:44:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:35 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 15:44:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080)='wireguard\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x50, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x2c}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}]}]}]}, 0x50}}, 0x0) 15:44:35 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) 15:44:35 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 15:44:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 15:44:36 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 15:44:36 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) 15:44:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="48000000300001000000000000000000000000003400010030000100080001"], 0x1}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) 15:44:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:36 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 15:44:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff9"], 0x3}}, 0x0) 15:44:36 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 15:44:36 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, 0x0}, 0x0) [ 434.757862][ T32] audit: type=1804 audit(1584287076.816:94): pid=18028 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir448321244/syzkaller.jbY3E3/157/cgroup.controllers" dev="sda1" ino=17177 res=1 15:44:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:37 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 15:44:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff9"], 0x3}}, 0x0) 15:44:37 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) 15:44:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="8e0ee867914529f69b334d", 0xb}], 0x1) 15:44:37 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, 0x0}, 0x0) 15:44:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:37 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 15:44:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff9"], 0x3}}, 0x0) 15:44:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f00000014c0), 0x4) 15:44:37 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) 15:44:37 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, 0x0}, 0x0) 15:44:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a69914"], 0x3}}, 0x0) 15:44:38 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 15:44:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:38 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) 15:44:38 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) 15:44:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a69914"], 0x3}}, 0x0) 15:44:38 executing program 2: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:38 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 15:44:38 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a69914"], 0x3}}, 0x0) 15:44:39 executing program 2: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:39 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 15:44:39 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) 15:44:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:39 executing program 2: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae571"], 0x3}}, 0x0) 15:44:39 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:39 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:44:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) 15:44:40 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0xa, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0d"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae571"], 0x3}}, 0x0) 15:44:40 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:44:40 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) 15:44:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0xa, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0d"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:40 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:40 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:44:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae571"], 0x3}}, 0x0) 15:44:41 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:41 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:44:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0xa, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0d"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:41 executing program 5: io_setup(0x0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 15:44:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eab"], 0x3}}, 0x0) 15:44:41 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:41 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:44:41 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:41 executing program 5: io_setup(0x0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 15:44:42 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:44:42 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eab"], 0x3}}, 0x0) 15:44:42 executing program 5: io_setup(0x0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 15:44:42 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) 15:44:42 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eab"], 0x3}}, 0x0) [ 440.529664][ T32] audit: type=1804 audit(1584287082.576:95): pid=18320 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/143/bus" dev="sda1" ino=16817 res=1 15:44:42 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:42 executing program 5: io_setup(0x4c0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:44:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) 15:44:43 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa"], 0x3}}, 0x0) [ 441.053986][ T32] audit: type=1804 audit(1584287083.116:96): pid=18338 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/144/bus" dev="sda1" ino=16977 res=1 15:44:43 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:43 executing program 5: io_setup(0x4c0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:44:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb561"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) 15:44:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa"], 0x3}}, 0x0) [ 441.486355][ T32] audit: type=1804 audit(1584287083.546:97): pid=18352 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/145/bus" dev="sda1" ino=16609 res=1 15:44:43 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:43 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:43 executing program 5: io_setup(0x4c0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:44:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb561"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x0, 0x0, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x74) [ 442.027550][ T32] audit: type=1804 audit(1584287084.086:98): pid=18372 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/146/bus" dev="sda1" ino=16689 res=1 15:44:44 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa"], 0x3}}, 0x0) 15:44:44 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb561"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:44 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(0x0, 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 442.514792][ T32] audit: type=1804 audit(1584287084.576:99): pid=18389 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/147/bus" dev="sda1" ino=17041 res=1 15:44:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x0, 0x0, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x74) 15:44:44 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc"], 0x3}}, 0x0) 15:44:44 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x12, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f96931"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:45 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(0x0, 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 443.043407][ T32] audit: type=1804 audit(1584287085.106:100): pid=18408 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/148/bus" dev="sda1" ino=17220 res=1 15:44:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc"], 0x3}}, 0x0) 15:44:45 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x0, 0x0, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x74) 15:44:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x12, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f96931"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:45 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(0x0, 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 15:44:45 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:45 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) 15:44:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x12, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f96931"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc"], 0x3}}, 0x0) [ 443.864045][ T32] audit: type=1804 audit(1584287085.926:101): pid=18532 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/149/bus" dev="sda1" ino=16626 res=1 15:44:46 executing program 5: io_setup(0x4c0, &(0x7f0000000240)) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:44:46 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:46 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x13, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4b"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x2}}, 0x0) 15:44:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) [ 444.532384][ T32] audit: type=1804 audit(1584287086.596:102): pid=18555 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/150/bus" dev="sda1" ino=17225 res=1 15:44:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x13, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4b"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:46 executing program 5: io_setup(0x4c0, &(0x7f0000000240)) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:44:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x2}}, 0x0) 15:44:46 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) 15:44:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x13, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4b"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 445.153963][ T32] audit: type=1804 audit(1584287087.216:103): pid=18574 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/151/bus" dev="sda1" ino=17241 res=1 15:44:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000012002102000000000000000007000000", @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x2}}, 0x0) 15:44:47 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:47 executing program 5: io_setup(0x4c0, &(0x7f0000000240)) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:44:47 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x74) 15:44:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x13, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf49727"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:47 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x0, 0x0) 15:44:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x2}}, 0x0) [ 445.724941][ T32] audit: type=1804 audit(1584287087.786:104): pid=18593 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/152/bus" dev="sda1" ino=17242 res=1 15:44:47 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:48 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x74) 15:44:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x13, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf49727"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x2}}, 0x0) 15:44:48 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) [ 446.289332][ T32] audit: type=1804 audit(1584287088.346:105): pid=18613 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/153/bus" dev="sda1" ino=17253 res=1 15:44:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x13, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf49727"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:48 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x0, 0x0) 15:44:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x74) 15:44:48 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x2}}, 0x0) 15:44:49 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) [ 446.884941][ T32] audit: type=1804 audit(1584287088.946:106): pid=18633 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/154/bus" dev="sda1" ino=17239 res=1 15:44:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10}, 0x74) 15:44:49 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x0, 0x0) 15:44:49 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c"], 0x42) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10}, 0x74) [ 447.432762][ T32] audit: type=1804 audit(1584287089.486:107): pid=18651 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/155/bus" dev="sda1" ino=17252 res=1 15:44:49 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c"], 0x42) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:49 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:49 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x0, &(0x7f0000000140)) 15:44:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10}, 0x74) 15:44:50 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:50 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x0, &(0x7f0000000140)) 15:44:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:50 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c"], 0x42) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:44:50 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x0, &(0x7f0000000140)) 15:44:50 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 448.834844][ T32] audit: type=1804 audit(1584287090.896:108): pid=18796 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/157/bus" dev="sda1" ino=17267 res=1 15:44:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000120021020000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:51 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0a"], 0x61) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:44:51 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[0x0]) 15:44:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000120021020000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) [ 449.405655][ T32] audit: type=1804 audit(1584287091.466:109): pid=18813 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/158/bus" dev="sda1" ino=17274 res=1 15:44:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:51 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:51 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0a"], 0x61) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x5f}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:44:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000120021020000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:52 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[0x0]) [ 449.978494][ T32] audit: type=1804 audit(1584287092.036:110): pid=18832 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/159/bus" dev="sda1" ino=17276 res=1 15:44:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 15:44:52 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:52 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0a"], 0x61) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001200210200000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 15:44:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x22000000c0ffffff}) 15:44:52 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 15:44:52 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[0x0]) [ 450.766134][ T32] audit: type=1804 audit(1584287092.826:111): pid=18854 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/160/bus" dev="sda1" ino=17265 res=1 15:44:53 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01"], 0x71) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 15:44:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001200210200000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:53 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 15:44:53 executing program 4: unshare(0x20400) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) [ 451.302084][T18857] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.320036][ T32] audit: type=1804 audit(1584287093.376:112): pid=18873 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/161/bus" dev="sda1" ino=17265 res=1 15:44:53 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01"], 0x71) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:53 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 15:44:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001200210200000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) [ 451.665292][T11536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 451.675414][T11536] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.682701][T11536] bridge0: port 1(bridge_slave_0) entered forwarding state 15:44:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 451.969809][ T32] audit: type=1804 audit(1584287094.026:113): pid=18894 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/162/bus" dev="sda1" ino=17282 res=1 [ 452.229295][T18857] bridge0: port 1(bridge_slave_0) entered disabled state 15:44:54 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r3, 0x0, 0x0, 0x40) lseek(r3, 0x0, 0x3) 15:44:54 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x9, @raw_data="2f98d9ef36ed7a29593434347f28fc241fe51b93f9dc1fdc8d3e220692138df12f8de2c2b03afa1461aba4cb2a3e35158c0b7d787da2a48c3552a0305e957f94c7133ed76908617bda6ea891d8b69c1447bfb2dc551fca79f03b72ab29e9c407c1ba492ea38f063b745acc0d4dda1f1125363f6b8c66d8c907d0fc866e649982945e8dc223220ff69b314e9665dab8202d52f39726d189f56616f435e7f113ecf92604141d49657963cafba8bf9b84d92a297a271d506fa2b5992866c3892e38f878383396abca4d"}) 15:44:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:54 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01"], 0x71) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001200210200000000000000000700", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:54 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 452.354802][T18865] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.362209][T18865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.532571][ T32] audit: type=1804 audit(1584287094.586:114): pid=18909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/163/bus" dev="sda1" ino=17284 res=1 15:44:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:54 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100), 0xc, 0x0}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000b80)=@ethernet={0x0, @local}, 0x80, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000081c0)=[{{0x0, 0x38e, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/207, 0xcf}, {&(0x7f00000008c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/171, 0xab}], 0x3}}], 0x1, 0x0, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={&(0x7f00000001c0), 0x8}) recvmsg(0xffffffffffffffff, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000c00)=""/87, 0x7d}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x97}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:44:54 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 15:44:54 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758e"], 0x79) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001200210200000000000000000700", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioctl$KDGKBDIACR(r2, 0x4b66, &(0x7f0000000000)=""/89) [ 453.154941][ T32] audit: type=1804 audit(1584287095.216:115): pid=18932 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/164/bus" dev="sda1" ino=17262 res=1 15:44:55 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={{r1}}) 15:44:55 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 15:44:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001200210200000000000000000700", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:55 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758e"], 0x79) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000040107041dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 15:44:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendmmsg(r2, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 15:44:55 executing program 5: io_setup(0x4c0, &(0x7f0000000240)=0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) [ 453.856611][ T32] audit: type=1804 audit(1584287095.916:116): pid=18956 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/165/bus" dev="sda1" ino=17260 res=1 15:44:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000120021020000000000000000070000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:44:56 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758e"], 0x79) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 454.161189][T18965] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 15:44:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x7d, &(0x7f00000002c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @multicast1}}}}, &(0x7f0000000380)=0xb0) 15:44:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in=@loopback}, {@in6=@dev, 0x0, 0x32}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x68, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xe0, 0x40, "ff16e5ded35716882b9ed9bd5c3ce80304a2c5776ada0000b18a100b"}}]}, 0x158}}, 0x0) [ 454.481210][ T32] audit: type=1804 audit(1584287096.536:117): pid=18976 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/166/bus" dev="sda1" ino=17263 res=1 15:44:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:44:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000120021020000000000000000070000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:56 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f"], 0x7d) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:56 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x0, &(0x7f0000000140), &(0x7f0000000040)=0x4) 15:44:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:44:57 executing program 5: r0 = socket(0x10, 0x10000000000003, 0x0) write(r0, &(0x7f0000000040)="26000000130046f10701c1b00ed95d182800fe8f635778a20100008007000000090000000000", 0x26) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080)=0x384d, 0x4) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/102400, 0x19000}, 0x0) 15:44:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020f00061400000000000000ffffff7f0800120000000300000000000000000006000000800000000100000000000000ac141423fffffff20000000000000000fe8000000000000000000000000000bb05000500008000000a00000000001200000000000000000000000000000000000000000000000000050006006c0000000a004e2400000009fe80000000000000000000000000001d020000000000000019ca1dd9d9b7e90234315f676710a9c5b529e0000fede06399d7fcfdfa7d0a9355c57a99825458d487ace2869240550fe75eece8072a93000384"], 0xa0}}, 0x4004842) 15:44:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000120021020000000000000000070000", @ANYRES32=0x0, @ANYBLOB="00000000000000000800c000000000005c19a5080c921b1e9c71637a2443cf2a3696c2a5d186cd88d37e8947c9d59e748837e74bf0ceaff959b56e6900a12d14e8992d372ad695024783f2f5317c2cc948a6991407bf8263cea039a5c39b51aae57175ae4180b42eabaea6fa15cc26"], 0x3}}, 0x0) 15:44:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_ROLE={0x8, 0x4, 0x2}]}}}}]}, 0x48}}, 0x0) 15:44:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="b40500000000000061104d000000000073013100000000009500000000000000f1dd3582a4f5b72a16768b3bd9d948e7ab9a7d2125889528ea2e854de432a51acfcb2daa108c309d95944a55718228ca0df25fa4a944e7b6bedc021d7c88e842cdb1ee97c3ca7c556a0b027ada2cbdfe167751fd78d74da318b8baa5c2e530ee51951b6028fb745b1db82bb5613616f435f4f379f969317f77649c4bf4972777c5"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:44:57 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f"], 0x7d) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:57 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000140)) r1 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="b1"], 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x13, r1, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000000)) 15:44:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 15:44:58 executing program 4: socket$alg(0x26, 0x5, 0x0) getpriority(0x1, 0xffffffffffffffff) 15:44:58 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x8}, 0x1c) getsockname(r0, 0x0, &(0x7f0000000380)) [ 456.037010][ T32] audit: type=1804 audit(1584287098.096:118): pid=19124 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/168/bus" dev="sda1" ino=16626 res=1 15:44:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) request_key(0x0, &(0x7f0000000600)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x4) socket$inet(0x2, 0x0, 0x0) 15:44:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 15:44:58 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f"], 0x7d) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:58 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) recvmmsg(r0, &(0x7f00000013c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x41, 0x0) 15:44:58 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001200)={0x0, 0x0, 0x0, {0x6, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) 15:44:58 executing program 0: r0 = socket(0x22, 0x2, 0x2) recvfrom$unix(r0, 0x0, 0x0, 0x40000021, 0x0, 0x0) [ 456.673992][ T32] audit: type=1804 audit(1584287098.736:119): pid=19150 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/169/bus" dev="sda1" ino=16785 res=1 15:44:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 15:44:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') preadv(r0, &(0x7f00000017c0), 0x22a, 0x0) 15:44:59 executing program 3: delete_module(0xfffffffffffffffe, 0x0) 15:44:59 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000080)) timer_create(0x0, 0x0, &(0x7f0000000200)) recvmmsg(0xffffffffffffffff, &(0x7f0000003f80)=[{{0x0, 0x0, 0x0}, 0x955}], 0x1, 0x0, 0x0) memfd_create(0x0, 0x1) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:44:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f00000002c0)='./file0\x00') mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f00000002c0)='./file0\x00') 15:44:59 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774"], 0x7f) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 457.546675][ T32] audit: type=1804 audit(1584287099.606:120): pid=19276 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/170/bus" dev="sda1" ino=17009 res=1 15:44:59 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:44:59 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774"], 0x7f) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:44:59 executing program 4: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x4800) 15:44:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 15:44:59 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) recvfrom$inet(r0, 0x0, 0x2, 0x0, 0x0, 0x0) 15:44:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003c00)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 15:45:00 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) [ 458.109791][ T32] audit: type=1804 audit(1584287100.166:121): pid=19293 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/171/bus" dev="sda1" ino=17089 res=1 15:45:00 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774"], 0x7f) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r1, r0}}, 0x18) 15:45:00 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001840)}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@rand_addr="97c96010b7d4c564962fa5b093eb21fe", @empty, @empty, 0x0, 0x0, 0x0, 0x400}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 15:45:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x804, r4, 0x1, 0x0, 0x6, @dev}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x14, 0x0, 0x9f0ea1dd08641403}, 0x14}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x8004) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:00 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:00 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xc}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) [ 458.754591][ T32] audit: type=1804 audit(1584287100.806:122): pid=19320 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/172/bus" dev="sda1" ino=17089 res=1 15:45:00 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 15:45:01 executing program 0: pipe2(&(0x7f0000000040), 0x0) mlock2(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000a90000/0x4000)=nil) 15:45:01 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x7c) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:01 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) [ 459.510660][ T32] audit: type=1804 audit(1584287101.566:123): pid=19451 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/173/bus" dev="sda1" ino=17311 res=1 15:45:01 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:01 executing program 0: socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r3 = dup(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000100)={r4, 0x7000000}) 15:45:01 executing program 4: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x3b) renameat2(r1, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000280)='./file0/file0\x00', 0x0) 15:45:01 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x7c) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x804, r4, 0x1, 0x0, 0x6, @dev}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x14, 0x0, 0x9f0ea1dd08641403}, 0x14}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x8004) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB='T'], 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000580)={0x1c, r1, 0x31905e13403123b7, 0x0, 0x0, {0xb}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 460.228123][ T32] audit: type=1804 audit(1584287102.286:124): pid=19474 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/174/bus" dev="sda1" ino=17327 res=1 15:45:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 15:45:02 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) 15:45:02 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x7c) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x804, r4, 0x1, 0x0, 0x6, @dev}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x14, 0x0, 0x9f0ea1dd08641403}, 0x14}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x8004) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:02 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x10000, 0x20000000209, 0x0, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000080)={0x20024b, 0x20000000209, 0x0, 0xffffffffffffffff}) r6 = dup2(r1, r5) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9, 0x0, 0xffffffffffffffff, 0x8}) 15:45:03 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000380)="cd3c7934b0e41cc05e19743c93344f78c15b1b70fa88b1d11faac8e864e0b52f37e7e91884c5e4fcbf1edc8a43b2dee2912ff9a16e17af1faf11425587bf112483a3d2f77c354463d709", 0x4a, 0xfffffffffffffffe) 15:45:03 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(0x0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:03 executing program 0: unshare(0x2a000400) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab06, 0x0) [ 461.623567][T19607] encrypted_key: master key parameter '' is invalid 15:45:03 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) [ 461.726746][T19612] encrypted_key: master key parameter '' is invalid 15:45:03 executing program 1: unshare(0x600) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x9b) 15:45:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x804, r4, 0x1, 0x0, 0x6, @dev}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x14, 0x0, 0x9f0ea1dd08641403}, 0x14}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x8004) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:04 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0x4004743b, &(0x7f0000000000)={0x0}) [ 461.951384][ T32] audit: type=1804 audit(1584287104.006:125): pid=19619 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/176/bus" dev="sda1" ino=17322 res=1 15:45:04 executing program 0: syz_open_procfs(0x0, &(0x7f0000000240)='smaps\x00') 15:45:04 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x3}}, 0x0) r2 = socket$inet(0x2, 0x6, 0x0) dup3(r2, r1, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}}, 0x18}}, 0x0) 15:45:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5415, 0x0) 15:45:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x4000)=nil, 0xfffffffffffffff4, 0x0) 15:45:04 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(0x0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:04 executing program 3: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x5423, 0x0) 15:45:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x804, r4, 0x1, 0x0, 0x6, @dev}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x14, 0x0, 0x9f0ea1dd08641403}, 0x14}}, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:05 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x71c000) 15:45:05 executing program 3: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x5423, 0x0) [ 463.112611][ T32] audit: type=1804 audit(1584287105.166:126): pid=19758 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/177/bus" dev="sda1" ino=17314 res=1 15:45:05 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_int(r0, 0x10d, 0xcd, 0x0, &(0x7f0000000080)) 15:45:05 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x1, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeedcafe}}) 15:45:05 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(0x0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x1001, r1) keyctl$read(0xb, r2, &(0x7f0000005340)=""/4096, 0xd900) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) 15:45:05 executing program 3: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x5423, 0x0) 15:45:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x804, r4, 0x1, 0x0, 0x6, @dev}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) socket$nl_generic(0x10, 0x3, 0x10) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:05 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 463.890704][ T32] audit: type=1804 audit(1584287105.946:127): pid=19779 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/178/bus" dev="sda1" ino=17342 res=1 15:45:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000000)=@ethtool_pauseparam={0x18}}) 15:45:06 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', 0x0, &(0x7f0000000280)=@ng={0x4, 0xf}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:06 executing program 3: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) [ 464.327143][ T32] audit: type=1804 audit(1584287106.376:128): pid=19788 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/249/bus" dev="sda1" ino=17317 res=1 15:45:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x1001, r1) keyctl$read(0xb, r2, &(0x7f0000005340)=""/4096, 0xd900) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) [ 464.511144][ T32] audit: type=1804 audit(1584287106.446:129): pid=19788 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/249/bus" dev="sda1" ino=17317 res=1 15:45:06 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) [ 464.539162][ T32] audit: type=1400 audit(1584287106.506:130): avc: denied { ioctl } for pid=19789 comm="syz-executor.4" path="socket:[45823]" dev="sockfs" ino=45823 ioctlcmd=0x8946 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:45:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x804, r4, 0x1, 0x0, 0x6, @dev}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:06 executing program 3: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:07 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', 0x0, &(0x7f0000000280)=@ng={0x4, 0xf}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 464.957044][ T32] audit: type=1804 audit(1584287106.766:131): pid=19800 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/179/bus" dev="sda1" ino=17313 res=1 15:45:07 executing program 0: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 465.196750][ T32] audit: type=1804 audit(1584287107.116:132): pid=19807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/250/bus" dev="sda1" ino=17342 res=1 15:45:07 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 465.346718][ T32] audit: type=1804 audit(1584287107.316:133): pid=19817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/180/bus" dev="sda1" ino=17315 res=1 15:45:07 executing program 3: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:07 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', 0x0, &(0x7f0000000280)=@ng={0x4, 0xf}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x804, r4, 0x1, 0x0, 0x6, @dev}, 0x14) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 465.642355][ T32] audit: type=1804 audit(1584287107.696:134): pid=19825 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/251/bus" dev="sda1" ino=17316 res=1 15:45:07 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup3(r2, r3, 0x0) 15:45:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 15:45:08 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:08 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 15:45:08 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:08 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) finit_module(r1, 0x0, 0x0) 15:45:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x14e}}, 0x0) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x400000000000000}, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0b") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 15:45:08 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:09 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) finit_module(r1, 0x0, 0x0) [ 466.955011][ T32] kauditd_printk_skb: 4 callbacks suppressed [ 466.955079][ T32] audit: type=1804 audit(1584287109.006:139): pid=19867 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/253/bus" dev="sda1" ino=17362 res=1 15:45:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 15:45:09 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:09 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) [ 467.462565][ T32] audit: type=1804 audit(1584287109.496:140): pid=19880 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/254/bus" dev="sda1" ino=17351 res=1 15:45:09 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) 15:45:09 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) finit_module(r1, 0x0, 0x0) [ 467.672229][ T32] audit: type=1804 audit(1584287109.726:141): pid=19884 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/184/bus" dev="sda1" ino=17321 res=1 15:45:09 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, 0x0, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:09 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:45:09 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 468.131256][ T32] audit: type=1804 audit(1584287110.136:142): pid=19894 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/255/bus" dev="sda1" ino=17366 res=1 15:45:10 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 468.289189][ T32] audit: type=1804 audit(1584287110.346:143): pid=19901 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/185/bus" dev="sda1" ino=17377 res=1 15:45:10 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:45:10 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, 0x0, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:10 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x1000000003, 0x4013, r0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f00001ee000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) [ 468.686893][ T32] audit: type=1804 audit(1584287110.746:144): pid=19912 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/256/bus" dev="sda1" ino=17364 res=1 15:45:10 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:45:10 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:11 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 468.947984][ T32] audit: type=1400 audit(1584287111.006:145): avc: denied { map } for pid=19920 comm="syz-executor.0" path="socket:[46063]" dev="sockfs" ino=46063 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 15:45:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, 0x0, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @rand_addr="b373ff7fffffffffffff00", 0xfffffffc}, 0x20) 15:45:11 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) [ 469.439927][ T32] audit: type=1804 audit(1584287111.496:146): pid=20037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/257/bus" dev="sda1" ino=17371 res=1 15:45:11 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r2, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:11 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 469.757357][ T32] audit: type=1804 audit(1584287111.816:147): pid=20042 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/187/bus" dev="sda1" ino=17368 res=1 15:45:11 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f9, &(0x7f0000000140)='sit0\x00') 15:45:12 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) [ 469.995138][ T32] audit: type=1804 audit(1584287112.056:148): pid=20053 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/258/bus" dev="sda1" ino=17387 res=1 15:45:12 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r2, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:12 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:12 executing program 0: kexec_load(0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000240)='<', 0x1}], 0x0) 15:45:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 15:45:12 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r2, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:12 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:12 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 15:45:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:45:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r0, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:13 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:13 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:13 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x2e, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) 15:45:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:45:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r0, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:13 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:14 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 15:45:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:45:14 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:45:14 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) finit_module(r1, 0x0, 0x0) 15:45:14 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 15:45:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r0, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:14 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 15:45:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) [ 472.582216][ T32] kauditd_printk_skb: 4 callbacks suppressed [ 472.582282][ T32] audit: type=1804 audit(1584287114.646:153): pid=20336 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/191/bus" dev="sda1" ino=17396 res=1 15:45:14 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:14 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x5423, 0x0) 15:45:15 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) finit_module(r1, 0x0, 0x0) 15:45:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r0}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:15 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) [ 473.111030][T20451] input: syz0 as /devices/virtual/input/input5 15:45:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) [ 473.277574][T20458] input: syz0 as /devices/virtual/input/input6 [ 473.323582][ T32] audit: type=1804 audit(1584287115.386:154): pid=20459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/192/bus" dev="sda1" ino=17404 res=1 15:45:15 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x5423, 0x0) 15:45:15 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) finit_module(r1, 0x0, 0x0) 15:45:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r0}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:15 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:15 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) 15:45:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) [ 473.872214][ T32] audit: type=1804 audit(1584287115.926:155): pid=20476 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/193/bus" dev="sda1" ino=17402 res=1 15:45:16 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x5423, 0x0) 15:45:16 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) [ 474.083219][T20484] input: syz0 as /devices/virtual/input/input7 15:45:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r0}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:45:16 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) 15:45:16 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 474.492999][ T32] audit: type=1804 audit(1584287116.546:156): pid=20495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/194/bus" dev="sda1" ino=17367 res=1 15:45:16 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 15:45:16 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) pipe(0x0) r1 = socket(0x1e, 0x1, 0x0) dup2(r1, r0) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 474.746008][T20505] input: syz0 as /devices/virtual/input/input8 15:45:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:16 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) 15:45:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:45:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 475.070363][ T32] audit: type=1804 audit(1584287117.126:157): pid=20513 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/195/bus" dev="sda1" ino=17421 res=1 [ 475.236077][ T32] audit: type=1800 audit(1584287117.236:158): pid=20512 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17413 res=0 15:45:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x2}]}}}]}, 0x3c}}, 0x0) 15:45:17 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:17 executing program 1: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 475.500593][T20626] input: syz0 as /devices/virtual/input/input9 15:45:17 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0xf}, 0xa3, 0x0) dup3(r1, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 15:45:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:45:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 475.890473][T20633] 8021q: adding VLAN 0 to HW filter on device bond1 [ 475.938930][ T32] audit: type=1804 audit(1584287117.996:159): pid=20641 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir189459047/syzkaller.s1HQje/196/bus" dev="sda1" ino=17421 res=1 15:45:18 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f0000000600)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe(\x00\x00\x7f\xff\xff\xff@!\a\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00\a\x00\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\a\x00vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x99\xb9j\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0X\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x990\xcei\xf2\xd1\x04\xde\xaa\xfa\xc0\xe9c\x81\x86\xc3j2m\xf6B\x19=h\x8fe\xc2\x13\x92?||\xbf\x10\x8f$\xdf^\xba\x04^\x13\r}\xd2n?3O\xb5\xa8\xfa\xfe\xe6\x92\xfd\x1c\xbc\x15\x81G\xbeC\xb2\x80\x87\x83\xb6\xf7wz\xcf\xa3c\xac\xe56\x8cg\x15\x9e\x96c') 15:45:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 15:45:18 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:18 executing program 1: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00'}, 0x48) 15:45:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:18 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:18 executing program 1: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x24, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_TIMEOUT={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}}, 0x0) 15:45:19 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c667363616368652c616363657373ea616e792c6e6f657874656e642c6d6d61702c64656275673d30"]) 15:45:19 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:19 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 477.302279][ T32] audit: type=1800 audit(1584287119.356:160): pid=20781 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17438 res=0 15:45:19 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:19 executing program 3: r0 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 15:45:19 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 477.687813][T20890] input: syz0 as /devices/virtual/input/input13 15:45:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00'}, 0x48) 15:45:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000007c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)="ba", 0x1}]) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r3, 0x2081ff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) r6 = socket(0x10, 0x2, 0x0) io_submit(r5, 0x2, &(0x7f00000007c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000000c0)="ba", 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x2, 0x5, 0x0, r6, 0x0}]) [ 477.819021][ T32] audit: type=1400 audit(1584287119.876:161): avc: denied { watch watch_reads } for pid=20889 comm="syz-executor.3" path="/root/syzkaller-testdir448321244/syzkaller.jbY3E3/227" dev="sda1" ino=16507 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1 15:45:20 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:20 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x1a) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x24, r1, 0x711, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}]}, 0x24}}, 0x0) 15:45:20 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 478.210192][T20908] input: syz0 as /devices/virtual/input/input14 15:45:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00'}, 0x48) 15:45:20 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:20 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={0xe0, 0x10, 0x7, 0x0, 0x0, {0x0, 0xf0ffff, 0x600}, [@nested={0x4}, @nested={0xc5, 0x0, 0x0, 0x1, [@generic="f0043a229c8316013a2a56546670e4032e86bb9ffe4b71b644e4954fb277a2aa155be2b9ab1ab108de50abe0685f415717a93f33c6517020609234864df4abe3cb03759e84209ae30d0744f021b592fb487a94fe7ba942ea5a6e9e21aff45159060f539c", @typed={0xd, 0x0, 0x0, 0x0, @str='/dev/kvm\x00'}, @generic="fad589bd01602fdb0ce1553a9db80268769746c379ff789f24386ab3307061871a90ed0a024e79090ac34aca0d48834c523ca043eb94772bf1e531e388c13d8bcb07393093d303db7ae121c649"]}]}, 0xe0}}, 0x0) 15:45:20 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:20 executing program 3: unshare(0x2000400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, 0x0, &(0x7f0000000000)) [ 478.835172][T21027] input: syz0 as /devices/virtual/input/input15 15:45:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) [ 479.056472][ T32] audit: type=1400 audit(1584287121.116:162): avc: denied { create } for pid=21030 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 15:45:21 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 479.225512][ T32] audit: type=1400 audit(1584287121.146:163): avc: denied { write } for pid=21030 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 15:45:21 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(0x0, &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:45:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x20000600) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, 0x0, 0x0) 15:45:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x68, r3, 0x1a4a040a37fccf23, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x1c, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x68}}, 0x0) [ 479.669591][ T32] audit: type=1804 audit(1584287121.726:164): pid=21153 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/274/bus" dev="sda1" ino=17446 res=1 [ 479.682692][T21154] input: syz0 as /devices/virtual/input/input16 15:45:21 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:22 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(0x0, &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 479.945303][ T32] audit: type=1400 audit(1584287122.006:165): avc: denied { setopt } for pid=21159 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:45:22 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) 15:45:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) [ 480.289921][ T32] audit: type=1804 audit(1584287122.346:166): pid=21198 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/275/bus" dev="sda1" ino=17439 res=1 15:45:22 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 480.420280][T21255] input: syz0 as /devices/virtual/input/input17 15:45:22 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(0x0, &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x68, r3, 0x1a4a040a37fccf23, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x1c, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x68}}, 0x0) 15:45:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:45:22 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 480.878092][ T32] audit: type=1804 audit(1584287122.926:167): pid=21290 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/276/bus" dev="sda1" ino=17439 res=1 15:45:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 15:45:23 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', 0x0, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:23 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 481.223408][T21320] input: syz0 as /devices/virtual/input/input18 15:45:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:45:23 executing program 0: ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 481.435426][ T32] audit: type=1804 audit(1584287123.496:168): pid=21397 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/277/bus" dev="sda1" ino=17465 res=1 15:45:23 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:23 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', 0x0, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x68, r3, 0x1a4a040a37fccf23, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x1c, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x68}}, 0x0) 15:45:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:45:23 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r3, 0x9}, 0x14) 15:45:24 executing program 0: ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 482.033038][ T32] audit: type=1804 audit(1584287124.086:169): pid=21425 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/278/bus" dev="sda1" ino=17476 res=1 15:45:24 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', 0x0, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127ba", 0x8e, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:24 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:24 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) 15:45:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:24 executing program 3: memfd_create(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc080661a, 0x0) 15:45:24 executing program 0: ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 482.596911][ T32] audit: type=1804 audit(1584287124.656:170): pid=21445 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/279/bus" dev="sda1" ino=17373 res=1 15:45:24 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:24 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:24 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) 15:45:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:25 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 483.159943][ T32] audit: type=1804 audit(1584287125.216:171): pid=21466 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/280/bus" dev="sda1" ino=17373 res=1 15:45:25 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) 15:45:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:25 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:25 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:25 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:25 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) [ 483.850469][ T32] audit: type=1804 audit(1584287125.906:172): pid=21488 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/281/bus" dev="sda1" ino=17487 res=1 15:45:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:26 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:26 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:26 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:26 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)) 15:45:26 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 484.460617][ T32] audit: type=1804 audit(1584287126.516:173): pid=21509 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/282/bus" dev="sda1" ino=17417 res=1 15:45:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:26 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600), 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:26 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:26 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:27 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)) 15:45:27 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:45:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 485.064554][ T32] audit: type=1804 audit(1584287127.126:174): pid=21529 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/283/bus" dev="sda1" ino=17373 res=1 15:45:27 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600), 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 485.250340][T21533] input: syz0 as /devices/virtual/input/input19 15:45:27 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:27 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:45:27 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)) 15:45:27 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:27 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600), 0x0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 485.645501][ T32] audit: type=1804 audit(1584287127.706:175): pid=21547 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/284/bus" dev="sda1" ino=16609 res=1 15:45:28 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB], 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 485.990462][T21562] input: syz0 as /devices/virtual/input/input20 15:45:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:28 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d", 0x47, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:28 executing program 4: syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0x40405515, &(0x7f00000000c0)) 15:45:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:28 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 486.265550][ T32] audit: type=1804 audit(1584287128.316:176): pid=21569 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/285/bus" dev="sda1" ino=16657 res=1 15:45:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:28 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c"], 0x42) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 486.575727][T21582] input: syz0 as /devices/virtual/input/input21 15:45:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:28 executing program 4: syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0x40405515, &(0x7f00000000c0)) 15:45:29 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:29 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d", 0x47, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 486.925096][ T32] audit: type=1804 audit(1584287128.986:177): pid=21592 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/286/bus" dev="sda1" ino=16801 res=1 15:45:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:29 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c"], 0x42) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:29 executing program 4: syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0x40405515, &(0x7f00000000c0)) [ 487.277986][T21603] input: syz0 as /devices/virtual/input/input22 15:45:29 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d", 0x47, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 487.477958][ T32] audit: type=1804 audit(1584287129.536:178): pid=21611 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/287/bus" dev="sda1" ino=16865 res=1 15:45:29 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) 15:45:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:29 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c"], 0x42) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:29 executing program 4: ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc1105511, &(0x7f00000000c0)=0xb) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0x40405515, &(0x7f00000000c0)) [ 487.858284][T21622] input: syz0 as /devices/virtual/input/input23 15:45:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) [ 488.033961][ T32] audit: type=1804 audit(1584287130.096:179): pid=21631 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/288/bus" dev="sda1" ino=17073 res=1 15:45:30 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e", 0x6b, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:30 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:30 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0a"], 0x61) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:30 executing program 4: ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc1105511, &(0x7f00000000c0)=0xb) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0x40405515, &(0x7f00000000c0)) [ 488.500712][T21644] input: syz0 as /devices/virtual/input/input24 15:45:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) [ 488.566402][ T32] audit: type=1804 audit(1584287130.626:180): pid=21652 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/289/bus" dev="sda1" ino=17073 res=1 15:45:30 executing program 4: ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc1105511, &(0x7f00000000c0)=0xb) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0x40405515, &(0x7f00000000c0)) 15:45:30 executing program 3: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:30 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0a"], 0x61) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:30 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e", 0x6b, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:30 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) [ 489.150099][ T32] audit: type=1804 audit(1584287131.206:181): pid=21670 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/290/bus" dev="sda1" ino=17249 res=1 [ 489.203703][T21672] input: syz0 as /devices/virtual/input/input25 15:45:31 executing program 3: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:31 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e", 0x6b, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:31 executing program 4: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) 15:45:31 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0a"], 0x61) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:31 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) [ 489.779045][ T32] audit: type=1804 audit(1584287131.836:182): pid=21690 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/291/bus" dev="sda1" ino=17249 res=1 15:45:31 executing program 3: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 489.894554][T21692] input: syz0 as /devices/virtual/input/input26 15:45:32 executing program 4: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) 15:45:32 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01"], 0x71) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:32 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec", 0x7d, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) 15:45:32 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:32 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 490.446764][ T32] audit: type=1804 audit(1584287132.506:183): pid=21706 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/292/bus" dev="sda1" ino=17089 res=1 15:45:32 executing program 4: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) [ 490.556847][T21714] input: syz0 as /devices/virtual/input/input27 15:45:32 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec", 0x7d, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:32 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01"], 0x71) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:32 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:33 executing program 4: syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc1105511, &(0x7f00000000c0)=0xb) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0x40405515, &(0x7f00000000c0)) [ 491.082024][ T32] audit: type=1804 audit(1584287133.136:184): pid=21731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/293/bus" dev="sda1" ino=17393 res=1 15:45:33 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:33 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01"], 0x71) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 491.296291][T21739] input: syz0 as /devices/virtual/input/input28 15:45:33 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec", 0x7d, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:33 executing program 4: syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc1105511, &(0x7f00000000c0)=0xb) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0x40405515, &(0x7f00000000c0)) 15:45:33 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 491.703086][ T32] audit: type=1804 audit(1584287133.756:185): pid=21754 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/294/bus" dev="sda1" ino=17441 res=1 15:45:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:34 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758e"], 0x79) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:34 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 491.961445][T21760] input: syz0 as /devices/virtual/input/input29 15:45:34 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc6", 0x86, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:34 executing program 4: syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc1105511, &(0x7f00000000c0)=0xb) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0x40405515, &(0x7f00000000c0)) 15:45:34 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 492.325305][ T32] audit: type=1804 audit(1584287134.386:186): pid=21772 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/295/bus" dev="sda1" ino=17281 res=1 15:45:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) 15:45:34 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758e"], 0x79) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:34 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc6", 0x86, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 492.727586][T21786] input: syz0 as /devices/virtual/input/input30 15:45:34 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, 0x0) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) [ 492.895929][ T32] audit: type=1804 audit(1584287134.956:187): pid=21793 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/296/bus" dev="sda1" ino=17281 res=1 15:45:35 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) 15:45:35 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758e"], 0x79) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:35 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, 0x0) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) 15:45:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:35 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc6", 0x86, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 493.439572][ T32] audit: type=1804 audit(1584287135.496:188): pid=21810 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/297/bus" dev="sda1" ino=17441 res=1 15:45:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) 15:45:35 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f"], 0x7d) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:35 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:36 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, 0x0) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) 15:45:36 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be3", 0x8a, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 493.988605][ T32] audit: type=1804 audit(1584287136.046:189): pid=21827 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/298/bus" dev="sda1" ino=17121 res=1 15:45:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:36 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:36 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f"], 0x7d) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:36 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) 15:45:36 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc6", 0x86, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) [ 494.656734][ T32] audit: type=1804 audit(1584287136.716:190): pid=21847 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/299/bus" dev="sda1" ino=17512 res=1 15:45:36 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:37 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f"], 0x7d) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:37 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) 15:45:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 15:45:37 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:37 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc6", 0x86, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 495.382586][ T32] audit: type=1804 audit(1584287137.446:191): pid=21873 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/300/bus" dev="sda1" ino=17510 res=1 15:45:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:37 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774"], 0x7f) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:37 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, &(0x7f00000000c0)) 15:45:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) 15:45:37 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 15:45:37 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc6", 0x86, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 496.001584][ T32] audit: type=1804 audit(1584287138.056:192): pid=21889 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/301/bus" dev="sda1" ino=17516 res=1 15:45:38 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)) 15:45:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) 15:45:38 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774"], 0x7f) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 15:45:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:38 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a90", 0x88, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:38 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)) [ 496.667033][ T32] audit: type=1804 audit(1584287138.726:193): pid=21914 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/302/bus" dev="sda1" ino=17514 res=1 15:45:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) 15:45:38 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774"], 0x7f) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 15:45:39 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)) 15:45:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:39 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a90", 0x88, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080), 0x10}, 0x74) [ 497.236460][ T32] audit: type=1804 audit(1584287139.296:194): pid=21932 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/303/bus" dev="sda1" ino=17121 res=1 15:45:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 15:45:39 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x7c) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:39 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, 0x0) 15:45:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080), 0x10}, 0x74) 15:45:39 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a90", 0x88, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 497.899217][ T32] audit: type=1804 audit(1584287139.956:195): pid=21953 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/304/bus" dev="sda1" ino=17525 res=1 15:45:40 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x201003, 0x0) truncate(&(0x7f0000000200)='./bus\x00', 0x0) 15:45:40 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, 0x0) 15:45:40 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x7c) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080), 0x10}, 0x74) 15:45:40 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 498.714693][ T32] audit: type=1804 audit(1584287140.776:196): pid=21971 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/305/bus" dev="sda1" ino=17510 res=1 15:45:41 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x7c) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:41 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0x40405515, 0x0) 15:45:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:45:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:41 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a90", 0x88, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:41 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) [ 499.352041][ T32] audit: type=1804 audit(1584287141.396:197): pid=21994 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/306/bus" dev="sda1" ino=17541 res=1 15:45:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newtaction={0x50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_ctinfo={0x38, 0x1, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18}, @TCA_CTINFO_ZONE={0x6}]}, {0x4}}}]}]}, 0x50}}, 0x0) 15:45:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) 15:45:41 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(0x0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:41 executing program 0: shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 15:45:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:41 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a90", 0x88, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x82}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x74) [ 500.021364][ T32] audit: type=1804 audit(1584287142.076:198): pid=22019 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/307/bus" dev="sda1" ino=17552 res=1 15:45:42 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:42 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x200a00}]) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00']) 15:45:42 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(0x0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:42 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a90", 0x88, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:42 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x87fff) open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) [ 500.660601][ T32] audit: type=1804 audit(1584287142.716:199): pid=22043 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/308/bus" dev="sda1" ino=17552 res=1 [ 500.770068][ T32] audit: type=1804 audit(1584287142.776:200): pid=22037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir518845545/syzkaller.YR28oE/290/bus/bus" dev="sda1" ino=17554 res=1 15:45:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:42 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) [ 500.798425][ T32] audit: type=1804 audit(1584287142.796:201): pid=22037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir518845545/syzkaller.YR28oE/290/bus/bus" dev="sda1" ino=17554 res=1 15:45:42 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(0x0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:43 executing program 5: add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r0}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 501.211602][ T32] audit: type=1804 audit(1584287143.266:202): pid=22089 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/309/bus" dev="sda1" ino=17563 res=1 15:45:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:43 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:43 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\t']) 15:45:43 executing program 5: add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r0}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 501.828411][ T32] audit: type=1804 audit(1584287143.886:203): pid=22040 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir518845545/syzkaller.YR28oE/290/bus/bus" dev="sda1" ino=17554 res=1 [ 501.856833][ T32] audit: type=1804 audit(1584287143.886:204): pid=22164 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir518845545/syzkaller.YR28oE/290/bus/bus" dev="sda1" ino=17554 res=1 15:45:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@ipv4={[], [], @empty}, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x86, 0x0, 0x0, 0x0, 0x85800000}) 15:45:44 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', 0x0, &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:44 executing program 5: add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r0}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:44 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:44 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) [ 502.353679][ T32] audit: type=1804 audit(1584287144.406:205): pid=22286 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/310/bus" dev="sda1" ino=17559 res=1 15:45:44 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(0x0, &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:44 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:44 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', 0x0, &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:44 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r1 = open(&(0x7f0000002000)='./bus\x00', 0xc4042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x3f, 0x0) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x200f0f) 15:45:45 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:45 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(0x0, &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 502.952374][ T32] audit: type=1804 audit(1584287145.006:206): pid=22404 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/311/bus" dev="sda1" ino=17569 res=1 15:45:45 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', 0x0, &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:45 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:45 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:45 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(0x0, &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:45 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:45 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:46 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 15:45:46 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:46 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:46 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:46 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) [ 504.507678][ T32] kauditd_printk_skb: 4 callbacks suppressed [ 504.507747][ T32] audit: type=1804 audit(1584287146.566:211): pid=22453 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/314/bus" dev="sda1" ino=17556 res=1 15:45:46 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:46 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:46 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r1 = open(&(0x7f0000002000)='./bus\x00', 0xc4042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x3f, 0x0) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x200f0f) 15:45:47 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:47 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 505.062401][ T32] audit: type=1804 audit(1584287147.116:212): pid=22469 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/315/bus" dev="sda1" ino=17582 res=1 15:45:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 505.263736][ T32] audit: type=1800 audit(1584287147.316:213): pid=22472 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=17549 res=0 15:45:47 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 505.339089][ T32] audit: type=1800 audit(1584287147.396:214): pid=22476 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=17549 res=0 15:45:47 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) 15:45:47 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:47 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 505.769546][ T32] audit: type=1804 audit(1584287147.826:215): pid=22491 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/316/bus" dev="sda1" ino=17549 res=1 15:45:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:48 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:48 executing program 2: pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:48 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 506.304319][ T32] audit: type=1804 audit(1584287148.356:216): pid=22510 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/317/bus" dev="sda1" ino=17588 res=1 15:45:48 executing program 2: pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 506.426237][T22502] IPVS: ftp: loaded support on port[0] = 21 15:45:48 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:48 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 506.948124][ T32] audit: type=1804 audit(1584287149.006:217): pid=22524 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/318/bus" dev="sda1" ino=17549 res=1 [ 507.136693][T22507] IPVS: ftp: loaded support on port[0] = 21 15:45:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) 15:45:49 executing program 2: pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:49 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:49 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:49 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 507.543575][ T383] tipc: TX() has been purged, node left! [ 507.599576][ T32] audit: type=1804 audit(1584287149.656:218): pid=22544 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/319/bus" dev="sda1" ino=17595 res=1 15:45:49 executing program 2: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:49 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:49 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 508.102729][T22548] IPVS: ftp: loaded support on port[0] = 21 [ 508.179008][ T32] audit: type=1804 audit(1584287150.236:219): pid=22559 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/320/bus" dev="sda1" ino=17609 res=1 15:45:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:50 executing program 2: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) 15:45:50 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:50 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:50 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(r1, 0x0, 0x0) 15:45:50 executing program 2: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000c95000/0x3000)=nil) 15:45:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 509.039307][ T32] audit: type=1804 audit(1584287151.096:220): pid=22582 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/321/bus" dev="sda1" ino=17616 res=1 15:45:51 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000c95000/0x3000)=nil) 15:45:51 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:51 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) finit_module(r1, 0x0, 0x0) 15:45:51 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) [ 509.627041][T22585] IPVS: ftp: loaded support on port[0] = 21 [ 509.660367][ T32] audit: type=1804 audit(1584287151.716:221): pid=22600 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/322/bus" dev="sda1" ino=17616 res=1 15:45:51 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) 15:45:52 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000c95000/0x3000)=nil) 15:45:52 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) finit_module(r1, 0x0, 0x0) 15:45:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 15:45:52 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 510.336560][ T32] audit: type=1804 audit(1584287152.396:222): pid=22616 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/323/bus" dev="sda1" ino=17625 res=1 15:45:52 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) pkey_mprotect(&(0x7f00008f7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000c95000/0x3000)=nil) 15:45:52 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) finit_module(r1, 0x0, 0x0) 15:45:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 15:45:52 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:52 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 510.873295][T22620] IPVS: ftp: loaded support on port[0] = 21 [ 510.925172][ T32] audit: type=1804 audit(1584287152.976:223): pid=22634 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/324/bus" dev="sda1" ino=17619 res=1 15:45:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) r1 = socket(0x10, 0x802, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0) [ 511.002932][ T383] tipc: TX() has been purged, node left! [ 511.041416][ T383] tipc: TX() has been purged, node left! 15:45:53 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) [ 511.186873][ T383] tipc: TX() has been purged, node left! 15:45:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:45:53 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:53 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) [ 511.451611][ T32] audit: type=1804 audit(1584287153.506:224): pid=22651 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/325/bus" dev="sda1" ino=17535 res=1 15:45:53 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 15:45:53 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) [ 511.977624][ T32] audit: type=1804 audit(1584287154.036:225): pid=22763 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/326/bus" dev="sda1" ino=17635 res=1 15:45:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000440)={&(0x7f00000005c0)=""/118, 0x76}) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair(0x2b, 0x0, 0x7, &(0x7f0000000240)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0xd, 0x0, 0x1, 0x3, 0x0, 0x1000}, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e23, 0x42, @ipv4={[], [], @multicast1}, 0x6}, 0x1c) 15:45:54 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:54 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="f2343f63f2df6db990e1b3cb6684e6d1788e16a5ef9bd037e6e7a0b55bf4be61bbc86cda124c1fd47ad1d0d23a200a86bb1997db1ac45806da8c8528905c3d6d8710bc4780e7b010f1e90b7549ce4970c4b04813618992a9670bf5da0ad4a922c0cc176601ee8381d455218c01e8e6fd0dbbf5758ebe98935f4774a9"], 0x80) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x3}, 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 15:45:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:45:54 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 512.579500][ T32] audit: type=1804 audit(1584287154.636:226): pid=22821 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir811566598/syzkaller.EjSIm6/327/bus" dev="sda1" ino=17524 res=1 15:45:54 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) close(0xffffffffffffffff) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 15:45:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:54 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./bus\x00', 0x2282, 0x0) 15:45:55 executing program 2: 15:45:55 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) close(0xffffffffffffffff) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 15:45:55 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:45:55 executing program 2: 15:45:55 executing program 1: 15:45:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:55 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) close(0xffffffffffffffff) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 15:45:55 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:56 executing program 2: 15:45:56 executing program 1: 15:45:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:45:56 executing program 2: 15:45:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x20) 15:45:56 executing program 4: unshare(0x2000400) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000001, 0x0) 15:45:56 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:56 executing program 1: 15:45:57 executing program 2: 15:45:57 executing program 4: unshare(0x2000400) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000001, 0x0) 15:45:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 15:45:57 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:57 executing program 1: 15:45:57 executing program 2: 15:45:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) sched_setattr(0x0, 0x0, 0x0) 15:45:57 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 15:45:57 executing program 4: unshare(0x2000400) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000001, 0x0) 15:45:57 executing program 1: 15:45:58 executing program 2: 15:45:58 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r2, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 15:45:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:45:58 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:58 executing program 1: 15:45:58 executing program 2: [ 516.502026][ T383] tipc: TX() has been purged, node left! 15:45:58 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r2, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:58 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:58 executing program 1: 15:45:58 executing program 2: 15:45:58 executing program 3: 15:45:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87fff) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) 15:45:59 executing program 2: 15:45:59 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r2, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:59 executing program 3: 15:45:59 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:45:59 executing program 1: 15:45:59 executing program 2: 15:45:59 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, 0x0, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:45:59 executing program 3: 15:45:59 executing program 4: unshare(0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:00 executing program 1: 15:46:00 executing program 2: 15:46:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87fff) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) 15:46:00 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="b9"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 15:46:00 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, 0x0, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:46:00 executing program 4: unshare(0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:00 executing program 1: socket$caif_stream(0x25, 0x1, 0x0) socket(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 15:46:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) socket$caif_stream(0x25, 0x1, 0x0) socket(0x10, 0x803, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="b9"], 0x1) fallocate(r1, 0x3, 0x800000, 0x8020003) 15:46:00 executing program 3: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_INIT(r3, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) read$FUSE(r2, &(0x7f0000000880), 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = fcntl$dupfd(r1, 0x0, r4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x48) write$P9_RREADLINK(r5, &(0x7f00000000c0)={0xe, 0x17, 0x0, {0x5, './bus'}}, 0xe) 15:46:01 executing program 4: unshare(0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:01 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, 0x0, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:46:01 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000000004001, 0x0) fallocate(r0, 0x0, 0x0, 0x400) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)="87b994fb436b69dffa76e56aeb77d1e853d39d2f8ed8403aea9182c26a98b0bfa6b40c3029c134a1584a0b6882d98e6f761154b40ff8363e9bdac5ad4f521eb33627719f7f5677a9af96ce9534c4eca81444648f6b499b27935b88986b9dcd36b332fce56cc7ed536f56193a5cfac122f2b6466d002b8a6dab") 15:46:01 executing program 4: unshare(0x2000400) pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000001, 0x0) 15:46:01 executing program 2: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000000004001, 0x0) fallocate(r0, 0x0, 0x0, 0x400) 15:46:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87fff) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) 15:46:01 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:46:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe900, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x8, 0x1}, 0x0) 15:46:02 executing program 4: unshare(0x2000400) pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000001, 0x0) 15:46:02 executing program 3: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_INIT(r3, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) read$FUSE(r2, &(0x7f0000000880), 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = fcntl$dupfd(r1, 0x0, r4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x48) write$P9_RREADLINK(r5, &(0x7f00000000c0)={0xe, 0x17, 0x0, {0x5, './bus'}}, 0xe) 15:46:02 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:46:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='auxv\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='macvlan1\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='macvlan1\x00', 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) 15:46:02 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:46:02 executing program 4: unshare(0x2000400) pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000001, 0x0) 15:46:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) dup2(r2, r0) 15:46:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100000000000001, 0x20011, r3, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:46:03 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, 0x0) [ 521.086319][T23405] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 15:46:03 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) dup2(r2, r0) 15:46:03 executing program 2: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000000004001, 0x0) fallocate(r0, 0x0, 0x0, 0x400) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 15:46:03 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, 0x0) 15:46:03 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000000004001, 0x0) fallocate(r0, 0x0, 0x0, 0x400) creat(&(0x7f0000000280)='./file0\x00', 0x1) 15:46:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) socket$caif_stream(0x25, 0x1, 0x0) socket(0x10, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="b9"], 0x1) fallocate(r1, 0x3, 0x800000, 0x8020003) 15:46:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) dup2(r2, r0) 15:46:04 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, 0x0) 15:46:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='auxv\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='macvlan1\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) 15:46:04 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x10000000de7) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x2, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_DO_IT(r4, 0xab03) 15:46:04 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x4fbf81b4ee74f67) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 15:46:04 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:04 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={0x0}) 15:46:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, 0xffffffffffffffff, 0x0) dup2(r2, r0) [ 522.783678][T23591] block nbd3: Receive control failed (result -107) 15:46:04 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={0x0}) 15:46:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="b9"], 0x1) fallocate(r0, 0x3, 0x800000, 0x8020003) 15:46:05 executing program 2: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) socket(0x1000000010, 0x80002, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 15:46:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, 0xffffffffffffffff, 0x0) dup2(r2, r0) 15:46:05 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909b", 0x89, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)='>', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={0x0}) [ 523.417612][T23707] block nbd3: Device being setup by another task [ 523.450140][T23589] block nbd3: shutting down sockets 15:46:05 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 15:46:05 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:05 executing program 3: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x500000000}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000100)) tkill(r0, 0x5) ptrace(0x10, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$poke(0x4209, r0, &(0x7f00000000c0), 0x20000000) 15:46:06 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x1) write$P9_RLERRORu(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2) 15:46:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, 0xffffffffffffffff, 0x0) dup2(r2, r0) 15:46:06 executing program 3: ioctl$USBDEVFS_DISCARDURB(0xffffffffffffffff, 0x550b, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001600)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x1}) 15:46:06 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000000004001, 0x0) fallocate(r0, 0x0, 0x0, 0x400) creat(&(0x7f0000000280)='./file0\x00', 0x1) 15:46:06 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 15:46:06 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="b9"], 0x1) fallocate(r0, 0x3, 0x370000, 0x8020003) 15:46:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r2, r0) 15:46:06 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b80000001900010000ff0000000000002ef942059d04c1151a8a5cdcd4d15be8fe8000000000000000000000000001aa00000000000000000a0000003b000200", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000ec30e7fa7fd0e86b0000000000000000000000000000000045c424ee00"/99], 0xb8}}, 0x0) 15:46:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x24000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 525.265255][T23894] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 525.275608][T23894] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 525.285517][T23894] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 525.302741][T23894] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 15:46:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)=@newsa={0x148, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in6=@local, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'digest_null\x00'}}}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0x148}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0xf1, 0x0) [ 525.461637][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:46:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:07 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r2, r0) 15:46:08 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) close(r2) socket$netlink(0x10, 0x3, 0x15) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfeac) splice(r0, 0x0, r2, 0x0, 0x20000000010002, 0x0) 15:46:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:08 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) [ 526.189387][T24098] Dev loop0: unable to read RDB block 1 [ 526.195432][T24098] loop0: unable to read partition table [ 526.201235][T24098] loop0: partition table beyond EOD, truncated [ 526.207808][T24098] loop_reread_partitions: partition scan of loop0 (°J‚pf”§ÑTÆ)÷[q©Z;(’qÆ­²-MSOLòœÿY­QM:¢ {î¼hš°RHÜW/8éè¯iL ) failed (rc=-5) 15:46:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap$snddsp_control(&(0x7f0000ffb000/0x2000)=nil, 0x1000, 0x0, 0xb521fcc36485b9f3, 0xffffffffffffffff, 0x83000000) 15:46:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r2, r0) [ 526.488029][T24112] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 526.516694][T24110] Dev loop0: unable to read RDB block 1 [ 526.522604][T24110] loop0: unable to read partition table [ 526.528416][T24110] loop0: partition table beyond EOD, truncated [ 526.534920][T24110] loop_reread_partitions: partition scan of loop0 (°J‚pf”§ÑTÆ)÷[q©Z;(’qÆ­²-MSOLòœÿY­QM:¢ {î¼hš°RHÜW/8éè¯iL ) failed (rc=-5) 15:46:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:08 executing program 5: socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) close(r0) 15:46:08 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$getsig(0x18, 0x0, 0x0, 0x0) r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 15:46:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x84c) 15:46:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ftruncate(0xffffffffffffffff, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r2, r0) 15:46:09 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) lseek(r0, 0xf2b, 0x0) [ 527.347249][T24239] Dev loop0: unable to read RDB block 1 [ 527.353589][T24239] loop0: unable to read partition table [ 527.359476][T24239] loop0: partition table beyond EOD, truncated [ 527.365856][T24239] loop_reread_partitions: partition scan of loop0 (°J‚pf”§ÑTÆ)÷[q©Z;(’qÆ­²-MSOLòœÿY­QM:¢ {î¼hš°RHÜW/8éè¯iL ) failed (rc=-5) 15:46:09 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x84c) 15:46:10 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000001, 0x0) 15:46:10 executing program 5: syz_emit_ethernet(0x1a5, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) 15:46:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ftruncate(0xffffffffffffffff, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r2, r0) [ 528.218724][T24262] Dev loop0: unable to read RDB block 1 [ 528.224703][T24262] loop0: unable to read partition table [ 528.230510][T24262] loop0: partition table beyond EOD, truncated [ 528.237015][T24262] loop_reread_partitions: partition scan of loop0 (°J‚pf”§ÑTÆ)÷[q©Z;(’qÆ­²-MSOLòœÿY­QM:¢ {î¼hš°RHÜW/8éè¯iL ) failed (rc=-5) 15:46:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:10 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000001, 0x0) [ 528.933996][T24381] Dev loop0: unable to read RDB block 1 [ 528.939961][T24381] loop0: unable to read partition table [ 528.946018][T24381] loop0: partition table beyond EOD, truncated [ 528.952349][T24381] loop_reread_partitions: partition scan of loop0 (°J‚pf”§ÑTÆ)÷[q©Z;(’qÆ­²-MSOLòœÿY­QM:¢ {î¼hš°RHÜW/8éè¯iL ) failed (rc=-5) 15:46:11 executing program 2: 15:46:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ftruncate(0xffffffffffffffff, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r2, r0) 15:46:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000140)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}}, 0x0) 15:46:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x84c) 15:46:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:11 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000001, 0x0) 15:46:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x84c) 15:46:11 executing program 2: getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1802000000000000000000000000000018200000", @ANYRES32, @ANYBLOB="0000000000d800030000000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff32}, 0x6c) 15:46:11 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, 0x0, &(0x7f0000001580)='./file0\x00', 0xffffffffffffffff) 15:46:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(0xffffffffffffffff, r0) 15:46:12 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000001, 0x0) 15:46:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x84c) [ 530.161243][T24449] encrypted_key: keyword 'new' not allowed when called from .update method 15:46:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000180)=""/65) 15:46:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000200)='asymmetric\x00', 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000002c0)) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x10, 0x2000000002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="380000000000000029000000370000008903000000000000400edf4f42b2f95239c2e17b6124a63ec2040000000300010000000000000000480000000000000029000000360000003a05000000000000000100c910fe8000000000000000000000000000430718000000030492020001000080ffffffff0100008000000000001400000000000000290000000b0000000000000800000000200000000000000029000000360000002c000000000000000502fff70000000088000000000000002900000039000000000e01ff000000000000", @ANYRES32, @ANYBLOB="e480d4"], 0xd9}, 0x0) exit(0x80) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 15:46:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x84c) 15:46:12 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 15:46:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x14, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x4}}}]}, 0x34}}, 0x0) 15:46:13 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 15:46:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(0xffffffffffffffff, r0) 15:46:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000200)=""/89, 0xa}], 0x1}}], 0x4000000000000ed, 0x0, 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 15:46:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:13 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 15:46:14 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc={0x0, 0x117, 0x4, 0x8000}]}], 0x13c, 0x0) 15:46:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:14 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 15:46:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) r1 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) mq_notify(r1, &(0x7f0000000380)) fchown(0xffffffffffffffff, 0x0, 0x0) lchown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 15:46:14 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r0, r1, 0x0, 0x84c) 15:46:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(0xffffffffffffffff, r0) 15:46:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000200)=""/89, 0xa}], 0x1}}], 0x4000000000000ed, 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fanotify_mark(r1, 0x0, 0x0, r3, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 15:46:14 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 15:46:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:15 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r0, r1, 0x0, 0x84c) 15:46:15 executing program 4: unshare(0x2000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x88402, 0x0) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 15:46:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") unshare(0x2a000400) r1 = fanotify_init(0x0, 0x0) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) fanotify_mark(r1, 0x126, 0x800000b, r3, 0x0) 15:46:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000200)=""/89, 0xa}], 0x1}}], 0x4000000000000ed, 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fanotify_mark(r1, 0x0, 0x0, r3, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 15:46:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:16 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r0, r1, 0x0, 0x84c) 15:46:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:16 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, 0x0) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) [ 534.436567][ T32] audit: type=1400 audit(1584287176.496:227): avc: denied { watch } for pid=24843 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=65 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=filesystem permissive=1 [ 534.463941][ T32] audit: type=1400 audit(1584287176.496:228): avc: denied { watch_sb watch_reads } for pid=24843 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=65 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 15:46:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:16 executing program 5: 15:46:17 executing program 2: 15:46:17 executing program 5: 15:46:17 executing program 3: r0 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r0, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:17 executing program 4: 15:46:17 executing program 5: 15:46:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:17 executing program 2: 15:46:17 executing program 3: r0 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r0, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87fff) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) dup2(r0, 0xffffffffffffffff) 15:46:18 executing program 4: 15:46:18 executing program 5: 15:46:18 executing program 2: 15:46:18 executing program 3: r0 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r0, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:18 executing program 4: 15:46:18 executing program 5: 15:46:18 executing program 2: 15:46:18 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:19 executing program 4: 15:46:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87fff) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) dup2(r0, 0xffffffffffffffff) 15:46:19 executing program 5: 15:46:19 executing program 2: 15:46:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:19 executing program 4: 15:46:19 executing program 5: 15:46:19 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:19 executing program 2: 15:46:19 executing program 4: 15:46:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:20 executing program 5: 15:46:20 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87fff) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) dup2(r0, 0xffffffffffffffff) 15:46:20 executing program 4: 15:46:20 executing program 2: 15:46:20 executing program 5: 15:46:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) 15:46:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:20 executing program 2: 15:46:20 executing program 4: 15:46:21 executing program 5: 15:46:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x84c) [ 539.014282][T25070] Dev loop0: unable to read RDB block 1 [ 539.020233][T25070] loop0: unable to read partition table [ 539.026348][T25070] loop0: partition table beyond EOD, truncated [ 539.033046][T25070] loop_reread_partitions: partition scan of loop0 (°J‚pf”§ÑTÆ)÷[q©Z;(’qÆ­²-MSOLòœÿY­QM:¢ {î¼hš°RHÜW/8éè¯iL ) failed (rc=-5) 15:46:21 executing program 2: 15:46:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:21 executing program 4: 15:46:21 executing program 5: 15:46:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x84c) 15:46:21 executing program 2: 15:46:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:22 executing program 4: 15:46:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:22 executing program 5: 15:46:22 executing program 2: 15:46:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x84c) 15:46:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:22 executing program 5: 15:46:22 executing program 4: 15:46:22 executing program 2: 15:46:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x84c) 15:46:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) r3 = accept4(r2, &(0x7f0000000140)=@l2, &(0x7f0000000080)=0x80, 0xc0800) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000001c0)={0x9, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x88) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000002c0)=r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r4, &(0x7f0000000080)="030400306c00600040030000fff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 15:46:23 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xfb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x8, 'netpci0\x00', {'macvlan0\x00'}, 0x8}) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 15:46:23 executing program 4: [ 541.458388][T25135] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:46:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x84c) 15:46:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:23 executing program 4: 15:46:24 executing program 2: 15:46:24 executing program 2: 15:46:24 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) getpeername$unix(r2, &(0x7f0000000640)=@abs, &(0x7f0000000400)=0x6e) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f00000006c0)='./file0\x00', 0x0, 0x18}, 0x10) dup2(r4, 0xffffffffffffffff) pipe2(&(0x7f0000000040), 0x0) 15:46:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x84c) 15:46:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01cc3b", 0x52}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:25 executing program 4: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB="726577000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff020000000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000001040000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000f100000000000000000000000000000000000000000000000000000000000000000000000000000000e6ffff00000000ff0000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241624b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fefffffffae94b"], 0x1) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000140)={0x1f, @fixed}, 0xa) r3 = memfd_create(&(0x7f0000000040)='/~\x16\xcb\xc6aA\xeaf', 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 15:46:25 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="24000000110007031dfffd946fa2830020200aa001000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ddeb133c2b3ce9fad90f15a36a15584b3633421cb4672789", 0x4c}], 0x1}, 0x0) 15:46:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, 0x0, 0x0, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:25 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1f5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[@ANYBLOB="4b010000320000042dbd7000fddbdf25000000000c00020001000000000000001c0001000c000d0008000300050000000c001b00080003007ce000005c0001000c000400080003000500000010001a00090001006761637478ba420c1578db950e000000000c001500080001006e617400140005000f00010074b9ab2ff7814d756e6e656c5f6b657900000c001100080003000000000010000b000c000100736b6265646974000c00020001000000010000000c00020000000000010000000c000200000000000100000060000100100006000b000100736b626d6f"], 0x1}}, 0x80) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000640)=@abs, &(0x7f0000000400)=0x6e) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f00000006c0)='./file0\x00', 0x0, 0x18}, 0x10) socket$alg(0x26, 0x5, 0x0) 15:46:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x84c) 15:46:25 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a586b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000e1ff00000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a1de257beff195e305277dacaeb9cc685312e59c03a796744f376467be23f8907f62dfb4c182ab36f8f3e4168494d033fef6d4f0197c3314275e0ec0341151eec440c10e9670d0c619fc669d13ff545d682c211522eeec3c5375490ef6b950b21f4f8dba97e655c25db8303306dc9bb7e3ae9a25e893d5bc8439e1157ad0b4e0410e0a8640fc3eea5c9a2bff0c5c12c2413b86a43a5a24bdd22428e2631bd52901c81f6713f4361df6826b657528c5ba3e00ae01016709b86"], 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) getpeername$unix(r2, &(0x7f0000000640)=@abs, &(0x7f0000000400)=0x6e) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f00000006c0)='./file0\x00', 0x0, 0x18}, 0x10) dup2(r4, 0xffffffffffffffff) pipe2(&(0x7f0000000040), 0x0) 15:46:26 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x84c) 15:46:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, 0x0, 0x0, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:26 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'cpu'}]}, 0x5) 15:46:26 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vcsa(0xffffffffffffff9c, 0x0, 0x8400, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000040)='/~\x16\xcb\xc6aA\xeaf', 0x1) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKALIGNOFF(r4, 0x127a, &(0x7f00000000c0)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 15:46:27 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x66, &(0x7f0000000300)={@link_local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000001", 0x30, 0x2c, 0x0, @dev, @mcast2, {[@hopopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, [], @ipv4={[], [], @broadcast}, @local}}}}}}, 0x0) 15:46:27 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 15:46:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x84c) 15:46:27 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:27 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, 0x0, 0x0, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000380)='.^\xc5\xe3\xe8\x02\xa7\xe4/l\xbc\xc3x\xc93\xcaS\xbb\x1a\xaa\xaf\x02fpP\xfc\xc4\xd0^Rc-\r\f\xad\xf3\xd5_;\x1b\xb1C0f\x10\xfe\xca\xa4!\xa8\x1e\x9fn\x99\xcc\xe1\xb4u@\x15o\x8c\x8c6M\xce\x80\xe9\xa6\"ils.\xc0JK\xea\xf3\x97\"f\xc7\xc4\xfc\xa1\x17h\xeb\a`\xa5\x11\x89\xd8\xf5\xfbt\xc4\x8f^2\xec\x0e\xad\xfdX\r:\xfe\x03\xbd\x1b\xd5gX\xe2\xe1\xae\xd1\xd0\xfb\xafn0\xc2w\xd7\x04t\xbe\x04\f\xa2\xb9\xd7\xb8r\xa0*\xff\x88.E', 0x1) socket$inet_tcp(0x2, 0x1, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000000)={0x30, 0x0, 0x0, 0xffeffff, 0xc00, 0x0, [0xff0f, 0x3800000, 0x0, 0x3]}) dup(0xffffffffffffffff) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCSSERIAL(r2, 0x541e, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) creat(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x1267, 0xffffffffffffffff) 15:46:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xffffffffffffff66, 0x0}, 0x8}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_matches\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 15:46:27 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20008005, &(0x7f0000000100), 0x10) gettid() accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0xc0800) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000}, 0x1c) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030400306c00600040030000fff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 15:46:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x84c) [ 546.038486][T25447] blk_update_request: I/O error, dev loop0, sector 768 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 15:46:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}], 0x2, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x0) 15:46:28 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em*', 0x20, 0xdfc}, 0x2d, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$update(0x2, r0, &(0x7f0000000c80)="a26bb8d3a80d8ece91f39871fe6be69989a114733adaf9a96b28ad74285a635414fb11284a8d40ed5819449657786195411b45413afecc98bdad62a439de2fd249a53c7f57747d16a2d1db74540b404c059d209705f3f65c8caa1119d09d7f5e726e86d2c72330d56678a193ec4a8704", 0x70) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 15:46:28 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000200)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x0, 0x0, 0x0, 0x1d8, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@uncond, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}, {0x0, 0x0, 0x1d}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) 15:46:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x0) 15:46:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x7f4, 0x0) r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="24000000110007031dfffd946fa2830020200aa001000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ddeb133c2b3ce9fad90f15a36a15584b3633421cb4672789", 0x4c}], 0x1}, 0x0) 15:46:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}], 0x2, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 546.885238][T25578] encrypted_key: key trusted:em* not found [ 546.885645][T25578] encrypted_key: master key parameter '—óö\ŒªÐ^rn†ÒÇ#0Õfx¡“ìJ‡' is invalid [ 547.021072][T25578] encrypted_key: keyword 'new' not allowed when called from .update method 15:46:29 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x80024, 0x0) 15:46:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') sendfile(r1, r2, 0x0, 0x0) 15:46:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="04000004000319", 0x7}], 0x1) 15:46:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}], 0x2, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) 15:46:29 executing program 4: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vcsa(0xffffffffffffff9c, 0x0, 0x8400, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000040)='/~\x16\xcb\xc6aA\xeaf', 0x1) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 15:46:29 executing program 1: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) syz_open_procfs(0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 15:46:30 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:30 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) 15:46:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {0x0}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:30 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 15:46:31 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 15:46:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {0x0}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) r1 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1a1, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/104, 0x68}], 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0x1, 0xec, 0x435d, 0x400, 0xa9}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000200)={0x16, 0x0, 0x0, 0x11, 0x0, 0x1, 0x0, 0x15d, 0xfffffffffffffffe}) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) r3 = syz_open_procfs(0x0, 0x0) preadv(r3, 0x0, 0x0, 0x0) 15:46:31 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x80024, 0x0) 15:46:31 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87fff) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) dup2(r0, 0xffffffffffffffff) 15:46:32 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x11, 0x401, 0x0, 0x0, {}, [@IFA_LOCAL={0x8}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={0x0}}, 0x4004010) getpid() sched_setattr(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) 15:46:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:46:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {0x0}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000380), 0x0, 0x0) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x7f4, 0x0) r1 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="24000000110007031dfffd946fa2830020200aa001000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ddeb133c2b3ce9fad90f15a36a15584b3633421cb4672789", 0x4c}], 0x1}, 0x0) 15:46:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f0000000300)={@link_local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000001", 0x30, 0x2c, 0x0, @dev, @mcast2, {[@hopopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, [], @ipv4={[], [], @broadcast}, @local}}}}}}, 0x0) 15:46:33 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87fff) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) dup2(r0, 0xffffffffffffffff) 15:46:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:33 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 15:46:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x25, &(0x7f0000000000), 0x20a154cc) 15:46:34 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f00000002c0)='I', 0x1}], 0x0, 0x0) 15:46:34 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87fff) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) dup2(r0, 0xffffffffffffffff) 15:46:34 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 15:46:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:46:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000050000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 15:46:35 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:35 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, &(0x7f00000000c0)='\x00') 15:46:36 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:36 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 15:46:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cec", 0x29}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000003c0)={0x1c, r1, 0x31905e13403123b7, 0x0, 0x0, {0xc, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}, 0x1, 0x50000}, 0x0) 15:46:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VT_ACTIVATE(r0, 0x5606, 0x8) 15:46:36 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000001000/0x400000)=nil, 0x400000, 0x0) 15:46:36 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:46:38 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 15:46:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cec", 0x29}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:38 executing program 2: 15:46:38 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:38 executing program 4: 15:46:38 executing program 2: 15:46:39 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:39 executing program 4: 15:46:39 executing program 2: 15:46:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000007910300000000000c40000000a000000950000000000000022d10d990fb0d6059f78ac8d019988836e6b5b9a32e721c0825346b86a0eabc8c83df0309fdf5780f4b6cd81589ee44ed1c4ae8a74a46bad96f5f881111e26ae977eb5c260c7d773c206a51c58da0081c888215b3b10a44477a1129e7e0023440f8a405e87259edbeb30901dfe63039cb86790f2cd22a2a1f1fbcc98935f3c0b41162460a385ce552f4a8ee9a51f9520d19f318df91e2bcbb53afed14982ba2ad92a000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) close(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) 15:46:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cec", 0x29}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:46:42 executing program 4: 15:46:42 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:42 executing program 2: 15:46:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b", 0x3e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:42 executing program 1: 15:46:42 executing program 4: 15:46:42 executing program 1: 15:46:42 executing program 2: 15:46:42 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b", 0x3e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:42 executing program 4: 15:46:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 15:46:45 executing program 2: 15:46:45 executing program 1: 15:46:45 executing program 4: 15:46:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b", 0x3e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:45 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:45 executing program 4: 15:46:45 executing program 1: 15:46:45 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = socket(0x5, 0x0, 0xe) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') preadv(r1, 0x0, 0x0, 0x0) dup2(r0, r1) r2 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r3, r2) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='gfs2\x00', 0x80024, 0x0) 15:46:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f", 0x48}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x8, 0x0) 15:46:45 executing program 4: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000400)='\xfa\x00\x00\x00\x02\x00\x00\x00\xb46x_', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup2(r4, r1) ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)) 15:46:48 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000003c0)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@rand_addr="aae920fbb084320423e3d688e2115f55", @in6=@ipv4={[], [], @broadcast}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 15:46:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f", 0x48}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 15:46:48 executing program 2: syz_emit_ethernet(0x300506, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0) 15:46:48 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='security.capability\x00', &(0x7f00000002c0)=@v3, 0x18, 0x0) 15:46:48 executing program 1: ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000000)={0x30, 0x0, 0x3, 0x0, 0xc00, 0x0, [0xff0f, 0x3800000, 0x0, 0x3]}) dup(0xffffffffffffffff) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x68) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000140)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:46:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f", 0x48}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='$.6/%cpuset]\x00\xa5\xb6G\x12\xfd\xfe\xb1\xcdT\x96\xb4\x0e\xa0TqG\xa9+\xfd)\x15\xec\xdb2\x86\xc5\xd6\xdc&\xa9\x14\xed~\xba\x14\xb5\xe7\x96\xe7\x00\xc9\xe3\xf1 @]\xa3\x95\r\xb5\xdd\xbe\x9d#\b(\xe4\xd8\xe6\xfd\x1c\xef\x9a\xc5\xa1\x84\xd2\xee\x8ey\x92\xaf\xd8t\xf3\xcd\xa3\x9b\xc3\x1b\x8d\xfe\x88Z\xd6\xf5\xf4\x80\xd3\xb9l\xe6\xe9\x0e\xb7\x12\xaeTG\x16E!\xb9\xc15Y\xd4[\xf2\xd5E\x8d\x80p`\xde*3\x05\xb2\x956\xee{[I', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000faffc4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x39) membarrier(0x40, 0x0) perf_event_open$cgroup(&(0x7f0000000940)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x31, 0x56, 0x0, 0x8, 0x4, 0x3, 0x6, 0x8c, 0x100, 0x34, 0x124, 0x80000000, 0x9, 0x20, 0x2, 0x401}, [{0x6474e551, 0x6, 0x101, 0x1, 0x1, 0xad, 0x3, 0x1f}, {0x4, 0x5, 0x7f, 0x8, 0x81, 0x9, 0x3, 0xffffff80}], "3a285bbf28c37b86605bdbe9da4e8701bb2aabc2fb47dac74d6f", [[], [], [], [], [], [], []]}, 0x78e) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 15:46:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000003c0)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@rand_addr="aae920fbb084320423e3d688e2115f55", @in6=@ipv4={[], [], @broadcast}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 15:46:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x24008000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x8}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) syz_open_dev$ttys(0xc, 0x2, 0x1) mmap(&(0x7f0000196000/0x4000)=nil, 0x4000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000700)) [ 567.268635][ T32] audit: type=1400 audit(1584287209.326:229): avc: denied { cpu } for pid=26533 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 15:46:49 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee", 0x4d}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee", 0x4d}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x110) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = dup(0xffffffffffffffff) write$P9_RREADDIR(r2, &(0x7f0000000240)=ANY=[@ANYRESOCT], 0x17) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x68) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000140)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000000)=0x1, 0x80, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x1, 0x1) syz_open_pts(0xffffffffffffffff, 0x0) 15:46:51 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x20, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$tipc2(0x0) chmod(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f00000000c0)="0f20d86635200000000f22d826d33566b91109000066b80060000066ba000000000f306766c74424000d0000006766c7442402f60000006766c744240600000000670f0114246766c74424003f8c00006766c7442402e4d400006766c744240600000000670f011424650f01c8b8dd000f00d80f21f30f01c3ddc3", 0x7b}], 0x1, 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x6082, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x32000, 0x1000}, 0x1c) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) bind$xdp(0xffffffffffffffff, &(0x7f0000000900), 0x10) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8044}, 0x0) 15:46:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 15:46:51 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@ipv6_newrule={0x30, 0x20, 0x80d, 0x0, 0x0, {0x2, 0x80}, [@FRA_DST={0x14, 0x1, @remote}]}, 0x30}}, 0x0) 15:46:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r1 = socket(0x10, 0x80002, 0x0) sendfile(r1, r0, 0x0, 0xf0d) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) fdatasync(0xffffffffffffffff) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, 0x0) 15:46:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee", 0x4d}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:52 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) [ 570.575058][ T32] audit: type=1800 audit(1584287212.636:230): pid=26616 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17633 res=0 15:46:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@ipv4={[], [], @multicast1}, 0x1d}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffd71}, {0x0, 0x1e1}, {&(0x7f00000002c0)=""/66, 0x9}], 0x3, 0x0, 0xb9, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:46:52 executing program 1: pipe(&(0x7f0000000240)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r3, &(0x7f0000008880), 0x38, 0x20, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 15:46:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c0f01", 0x50}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 571.415746][T26762] Dev loop0: unable to read RDB block 1 [ 571.421846][T26762] loop0: unable to read partition table [ 571.427633][T26762] loop0: partition table beyond EOD, truncated [ 571.434015][T26762] loop_reread_partitions: partition scan of loop0 (°J‚pf”§ÑTÆ)÷[q©Z;(’qÆ­²-MSOLòœÿY­QM:¢ {î¼hš°RHÜW/8éè¯iL ) failed (rc=-5) 15:46:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socketpair$unix(0x1, 0x40000000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_bt_hci(r0, 0x400448e2, 0x0) 15:46:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 15:46:54 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) [ 573.024448][T26778] Dev loop0: unable to read RDB block 1 [ 573.030345][T26778] loop0: unable to read partition table [ 573.036743][T26778] loop0: partition table beyond EOD, truncated [ 573.043067][T26778] loop_reread_partitions: partition scan of loop0 (°J‚pf”§ÑTÆ)÷[q©Z;(’qÆ­²-MSOLòœÿY­QM:¢ {î¼hš°RHÜW/8éè¯iL ) failed (rc=-5) 15:46:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481", 0x4c}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:55 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r1 = socket(0x10, 0x80002, 0x0) sendfile(r1, r0, 0x0, 0xf0d) 15:46:55 executing program 2: 15:46:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)=0x23) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0000f7ffffffffffffff00"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffff, 0x0, "9526243a91766187af02ccd3242826b1a31870"}) 15:46:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481", 0x4c}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:56 executing program 1: 15:46:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x6f}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:46:56 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:46:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev={0xfe, 0x80, [0x0, 0x0, 0x8]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r4}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f00000048c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf25040000007400018014000200626f6e645f020076657468315f766c616e00000000000008000100", @ANYRES32=0x0, @ANYBLOB="14000200766574683100000000000000000000000800030002000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="140002007465616d5f736c6176655f30000000002000018008000300010000001400020073797a6b616c6c6572310000000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="280001800800030001000000080003000200000014000200626f6e645f736c6176655f31000000001c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000300030000001400018008000100", @ANYRES32, @ANYBLOB="08000300030000007c00018014000200626f6e645f736c6176655f310000000008000300030000000800030000000000140002006d6163766c616e300000000000000000140002006e72300000000000000000000000000008000100", @ANYPTR64, @ANYRESOCT, @ANYRES32=r4, @ANYBLOB], 0x15}, 0x1, 0x0, 0x0, 0xc00}, 0x4050) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 15:46:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:46:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481", 0x4c}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:58 executing program 4: 15:46:58 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:46:58 executing program 4: 15:46:58 executing program 1: 15:46:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee", 0x4d}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:46:58 executing program 2: 15:46:58 executing program 4: 15:46:58 executing program 1: 15:47:01 executing program 2: 15:47:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:01 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:01 executing program 4: 15:47:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee", 0x4d}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:01 executing program 1: 15:47:01 executing program 1: 15:47:01 executing program 4: 15:47:01 executing program 2: 15:47:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee", 0x4d}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:02 executing program 1: 15:47:02 executing program 4: 15:47:02 executing program 2: 15:47:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:04 executing program 1: 15:47:04 executing program 4: 15:47:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x2, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:04 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:04 executing program 2: 15:47:04 executing program 2: 15:47:04 executing program 1: 15:47:04 executing program 4: 15:47:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x2, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:05 executing program 2: 15:47:05 executing program 1: 15:47:05 executing program 4: 15:47:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:05 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'geneve0\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000180)="0503040006003e0000004000c52c", 0xe, 0x0, 0x0, 0x0) 15:47:05 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%n'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffffffc) getdents64(r0, &(0x7f0000000280)=""/4096, 0x1000) 15:47:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000480)={{0x14, 0x60c}, [], {0x14}}, 0x28}}, 0x0) 15:47:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x2, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {0x0}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:06 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%n'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) getdents64(r0, &(0x7f0000000280)=""/4096, 0x1000) 15:47:06 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%n'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffffffc) getdents64(r0, &(0x7f0000000280)=""/4096, 0x1000) 15:47:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {0x0}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) listen(r0, 0x200000000002) r1 = socket$inet6(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 15:47:06 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x12) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x2010}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:47:07 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) lstat(0x0, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3efc882c22996f041d103af500"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) 15:47:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {0x0}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x254, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0xa00, {0xfd, 0x0, 0x4800, 0x0, 0x7a}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0xffffffc3}, 0x0) 15:47:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b80)=""/4, 0x4}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x4e, 0x0) [ 585.977607][T27411] team0: Device ipvlan1 failed to register rx_handler 15:47:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:09 executing program 2: r0 = socket$inet(0x2, 0x2000080001, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x6) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000a, 0x550}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x20) userfaultfd(0x180800) clone(0x1fe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000440)="3058020af10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd2672693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697863e6ebd80f75cadcb793662562", 0x68, 0xfffffffffffffffd) r1 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x271b, 0x0, &(0x7f000033bffc)) creat(&(0x7f0000000040)='./bus\x00', 0x1) socket$netlink(0x10, 0x3, 0x5) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) 15:47:09 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:09 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 15:47:09 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) connect$can_bcm(r0, &(0x7f0000000140), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) pipe(&(0x7f0000000200)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") io_submit(r1, 0x2000000000000072, &(0x7f0000000080)) 15:47:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 587.561477][T27535] PKCS8: Unsupported PKCS#8 version 15:47:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0xf, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x5d6, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r2}, @IFLA_HSR_SLAVE2={0x8, 0x2, r4}]}}}]}, 0x40}}, 0x0) getuid() 15:47:09 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x20000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800000, 0x6}) 15:47:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 588.232438][T27655] device batadv0 entered promiscuous mode 15:47:10 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) connect$can_bcm(r0, &(0x7f0000000140), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) pipe(&(0x7f0000000200)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") io_submit(r1, 0x2000000000000072, &(0x7f0000000080)) [ 588.358949][T27655] lo: Cannot use loopback or non-ethernet device as HSR slave. 15:47:10 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) [ 588.494900][T27655] device batadv0 left promiscuous mode 15:47:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) 15:47:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de94690", 0x8e}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0xf, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x5d6, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r2}, @IFLA_HSR_SLAVE2={0x8, 0x2, r4}]}}}]}, 0x40}}, 0x0) getuid() 15:47:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) lstat(0x0, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040), 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x2, @rand_addr="ff3efc882c22996f041d103af500"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) 15:47:12 executing program 2: 15:47:12 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(0xffffffffffffffff, r0) 15:47:12 executing program 2: [ 590.878530][T27793] device batadv0 entered promiscuous mode [ 591.002307][T27793] lo: Cannot use loopback or non-ethernet device as HSR slave. 15:47:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de94690", 0x8e}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 591.107090][T27793] device batadv0 left promiscuous mode 15:47:13 executing program 2: 15:47:13 executing program 1: 15:47:13 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(0xffffffffffffffff, r0) 15:47:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) lstat(0x0, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040), 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x2, @rand_addr="ff3efc882c22996f041d103af500"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) 15:47:15 executing program 1: 15:47:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:15 executing program 2: 15:47:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de94690", 0x8e}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:15 executing program 4: 15:47:15 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(0xffffffffffffffff, r0) 15:47:16 executing program 1: 15:47:16 executing program 2: 15:47:16 executing program 4: 15:47:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f", 0xd5}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:16 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(0x0, 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:16 executing program 2: 15:47:16 executing program 4: [ 595.603328][ T0] NOHZ: local_softirq_pending 08 15:47:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000100)='./file0\x00', 0x1000, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x0, 0x0) 15:47:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, &(0x7f0000000000)) epoll_create1(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000ecff000000005cffffff851000000300000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x890) socket(0x0, 0x8000000000000003, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/39, 0x27) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 15:47:19 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(0x0, 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f", 0xd5}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x5}, 0xa20, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xd8d0668c81aa2fa3) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:47:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3ce}}], 0x69f, 0x3a, 0x0) 15:47:19 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(0x0, 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f", 0xd5}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:19 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast, @initdev}, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) write$evdev(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 15:47:19 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000080)='pstore\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x3ff) [ 597.717519][T27898] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 597.727755][T27898] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 597.742648][T27898] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 597.752034][T27898] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:47:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c8877933", 0xf9}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 598.261362][T27942] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pid=27942 comm=syz-executor.4 [ 599.442745][ T0] NOHZ: local_softirq_pending 08 15:47:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, 0x0) 15:47:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c8877933", 0xf9}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:22 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:22 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x20000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr(0x0, &(0x7f0000000100)=@known='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$overlay(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='default_permiss', @ANYRESDEC=0x0]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x210000, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000080)=""/120) socket$inet_udp(0x2, 0x2, 0x0) 15:47:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000240)="f00fc74f906766c7442400010000006766c7442402000000006766c744240600000000670f0114240f22c2baf80c66b8d01a968d66efbafc0c66b8b500000066ef2e99640f0f8200700cbaf80c66b81cb7068166efbafc0cb8aa4feff40f01df0fae060010", 0x65}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cf], 0x1f005}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 600.478823][T28045] overlayfs: unrecognized mount option "default_permiss00000000000000000000" or missing value 15:47:22 executing program 1: syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x4, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x7ffff000}], 0x1000000000000308) 15:47:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c8877933", 0xf9}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:23 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3ce}}], 0x69f, 0x3a, 0x0) 15:47:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff048) 15:47:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x10b}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002900)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00') preadv(r4, &(0x7f00000017c0), 0x1a0, 0xf0ffff) 15:47:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:25 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:25 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x30000739, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="5cacaae4d9dc6d2cfac118a88cbe7bb2851fb6d6c0557e771cb5e6507a080641c548336612da1482b5a7b10d0f4acd81208d7a83ee0922bf26a3e0c927602e80bad2c0352d6d9483d2426488cf80eaf378b96d484287b031aa6dfa9e9df9bcf4602fd7c7df3fa3e235659ffe708746d9d53e1d6acdb5cedadda27b5883ae8bb056ef007e1b490a4ebc97675aca57d98593ba9b11892f9b61c21c918e355ee0432af864e843df8e3caf03a4d00000000000000000000000cb4600000000000000020000"], 0xc9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x3) readv(r0, &(0x7f0000000680)=[{&(0x7f0000000440)=""/255, 0xff}], 0x1) sendto$inet(r0, &(0x7f0000000300)='\f', 0xc3f2, 0x11, 0x0, 0x0) 15:47:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x10b}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:25 executing program 2: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 15:47:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002900)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000700)=""/131, 0x83}], 0x1}, 0x8}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00') preadv(r3, &(0x7f00000017c0), 0x1a0, 0xf0ffff) 15:47:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x44000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 15:47:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x10b}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:26 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r2, r0) 15:47:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75", 0x114}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:26 executing program 4: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="c6292fdfe740aba82d39d236ab243325a1780500000000000000007274ce37fba681b500d0c814f800b8011a484e65b37e04000000758e8759c477cfc22ca7c07ced93b665d9e45871ee687d63f44d4da68a2bf9e07a4bba73665b0a0fe52f521c2b62"], 0xfc7c) fallocate(r0, 0x8, 0x0, 0x8000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB=')'], 0x1) lseek(r0, 0x0, 0x3) 15:47:26 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r2, r0) 15:47:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:28 executing program 1: 15:47:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x114}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:28 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r2, r0) 15:47:28 executing program 4: 15:47:28 executing program 2: 15:47:29 executing program 2: 15:47:29 executing program 4: 15:47:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:29 executing program 1: 15:47:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x114}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:29 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:29 executing program 1: 15:47:29 executing program 4: 15:47:29 executing program 2: 15:47:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:30 executing program 1: 15:47:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x118}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:30 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:30 executing program 4: 15:47:30 executing program 2: 15:47:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) fcntl$setlease(r0, 0x400, 0x0) 15:47:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x118}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:30 executing program 4: stat(0x0, 0x0) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) getpid() stat(&(0x7f00000000c0)='./file0\x00', 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) fsopen(&(0x7f0000000200)='ceph\x00', 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000001540)=',ppp0!+-]\x00', &(0x7f0000001580)='./file0\x00', r1) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, 0x0, 0x0) 15:47:30 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:30 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='cifs\x00', 0x0, &(0x7f0000000200)='\xda\xcf\xf9\xf4T\x19\x8e\xbf\x90\x1d\x1e\x88)\xfc\xfd\xa0b\f\xb6\xccf\x17(\xd1') syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 15:47:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x5) 15:47:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x5) 15:47:31 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000007c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000002300)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000002140)={0x14, r1, 0x1}, 0x14}}, 0x0) 15:47:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x118}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x5) 15:47:31 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) alarm(0x0) 15:47:31 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(0x0, 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) 15:47:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:31 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 15:47:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11a}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:32 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(0x0, 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000015c0), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) 15:47:32 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x1c, 0x18, 0x21}, 0x1c}}, 0x0) [ 610.438631][T28800] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:47:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8", 0x11a}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:32 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(0x0, 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:32 executing program 2: getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x420000, 0x0) open(&(0x7f0000001640)='./file0\x00', 0x161900, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x84, 0x4000000000000800, 0x1}, 0x3c) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000014c0)=ANY=[@ANYRES16=0x0, @ANYRESHEX]) 15:47:32 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x20000}, 0x20) r1 = socket(0x0, 0x2, 0x0) bind(r1, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) bind$xdp(0xffffffffffffffff, &(0x7f0000000900)={0x2c, 0x2}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x420000, 0x0) r2 = open(&(0x7f0000001640)='./file0\x00', 0x161900, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) socket$packet(0x11, 0x2, 0x300) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r5, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x84, 0x4000000000000800, 0x1}, 0x3c) 15:47:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000480)={{0x14, 0x60c}, [], {0x14}}, 0x28}}, 0x0) 15:47:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11a}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) [ 611.384138][T28916] ptrace attach of "/root/syz-executor.5"[28915] was attempted by "/root/syz-executor.5"[28916] 15:47:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) [ 611.579868][T28950] ptrace attach of "/root/syz-executor.5"[28949] was attempted by "/root/syz-executor.5"[28950] 15:47:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11b}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:33 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\t \x00\x00\x00\x00\x00\x00>oJ\x02u\x9b\xafa\xac\xcd\x13S\x9a\x01[\x1fa\xf3\x01f\x9e\x019CL/\xbd3 7\xa2\x1a\x0f\x99?\xacJ.iF$w\xa6~\xf6\xb0{\xb6\xec\xec\xf7\x96\xc7\xf7\x02?\x06\xbd~y\xe9\xf0\xeb\x10\xa9s\xccB\xae\t\xf1m\xc4`\xe3\x81Ol\xd3\xb9?\x03\xe1g\x96\x94QO\x11\xc5\x7f0\x9aF\x1b\xd8!5K\xe2K\xd2\x81\x99F\xae\xbc', 0x3) fcntl$addseals(r0, 0x409, 0x8) [ 611.847946][T28956] ptrace attach of "/root/syz-executor.5"[28955] was attempted by "/root/syz-executor.5"[28956] 15:47:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:34 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11b}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 612.676711][ T32] audit: type=1804 audit(1584287254.736:231): pid=28979 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir518845545/syzkaller.YR28oE/379/bus" dev="sda1" ino=17153 res=1 15:47:34 executing program 2: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, 0x0) [ 612.820859][ T32] audit: type=1804 audit(1584287254.776:232): pid=28979 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir518845545/syzkaller.YR28oE/379/bus" dev="sda1" ino=17153 res=1 [ 613.045327][T28984] binder: 28983:28984 ioctl 4018620d 0 returned -22 15:47:35 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffec4}, 0x48) socket$nl_generic(0x10, 0x3, 0x10) 15:47:35 executing program 1: getpid() openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast2=0xe000000f, 0x15, 0x0, 'sh\x00'}, 0x2c) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 15:47:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11b}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:35 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:47:35 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) 15:47:35 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffec4}, 0x48) [ 613.599738][T29102] encrypted_key: key user:syz not found [ 613.636359][T29102] encrypted_key: keyword 'new' not allowed when called from .update method [ 613.774096][ T32] audit: type=1804 audit(1584287255.836:233): pid=29109 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir518845545/syzkaller.YR28oE/380/bus" dev="sda1" ino=16737 res=1 15:47:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x2, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:36 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x2, 0x800000000000004, 0x400000, 0x1, 0x400, 0xffffffffffffffff, 0x0, [], r3}, 0x40) [ 613.966809][ T32] audit: type=1804 audit(1584287255.866:234): pid=29109 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir518845545/syzkaller.YR28oE/380/bus" dev="sda1" ino=16737 res=1 15:47:36 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) dup2(r2, r0) [ 614.520478][ T32] audit: type=1804 audit(1584287256.576:235): pid=29133 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir518845545/syzkaller.YR28oE/381/bus" dev="sda1" ino=17633 res=1 15:47:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x2, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 614.548576][ T32] audit: type=1804 audit(1584287256.576:236): pid=29133 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir518845545/syzkaller.YR28oE/381/bus" dev="sda1" ino=17633 res=1 15:47:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 15:47:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:37 executing program 1: sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) socket$packet(0x11, 0x0, 0x300) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 15:47:37 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r4, 0x0) dup2(r2, r0) 15:47:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:37 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x2, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:37 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe}}, 0x1c}}, 0x0) 15:47:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:37 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r4, 0x0) dup2(r2, r0) 15:47:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200000000005b47b4b04fed4e2a21ad8beb06b167de4283ffaec56d159e56a166c9db835a8808a86292f4bea321847a42767a7b89b65e4841c9695825a4b10dd5cb8b24f89f29ceef0a428124dcefb40b6b8ce6222864e92d22b053bda211a0aa613e4d66c8a0490480cbaca2b1216ca5637c028cbe0af4fd21ed36a2ddd56830044f3ead6d80d6f3f39955a2bb6662c29c913e8356d5a58ddb4293241f2ed955ffa0b9"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000700)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x8}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0xc, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @empty}]}}]}, 0x3c}}, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x4924924924926d3, 0x0) 15:47:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}, {&(0x7f0000000580)="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", 0x276, 0x800}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 15:47:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:38 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000015c0)={0x0, 0x20}, &(0x7f0000000080)=0x8) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x2, r3}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00', r3}) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x420000, 0x0) r4 = open(&(0x7f0000001640)='./file0\x00', 0x161900, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000300), 0x12) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r6, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) socket$packet(0x11, 0x2, 0x300) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r7, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x84, 0x4000000000000800}, 0x3c) [ 616.293003][T29389] FAT-fs (loop4): Directory bread(block 8) failed [ 616.299646][T29389] FAT-fs (loop4): Directory bread(block 9) failed [ 616.306497][T29389] FAT-fs (loop4): Directory bread(block 10) failed [ 616.313625][T29389] FAT-fs (loop4): Directory bread(block 11) failed [ 616.320212][T29389] FAT-fs (loop4): Directory bread(block 12) failed [ 616.326945][T29389] FAT-fs (loop4): Directory bread(block 13) failed [ 616.333622][T29389] FAT-fs (loop4): Directory bread(block 14) failed [ 616.340208][T29389] FAT-fs (loop4): Directory bread(block 15) failed [ 616.347043][T29389] FAT-fs (loop4): Directory bread(block 16) failed [ 616.353740][T29389] FAT-fs (loop4): Directory bread(block 17) failed 15:47:38 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r4, 0x0) dup2(r2, r0) 15:47:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@buf) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:47:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r0, 0x0) 15:47:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:39 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r4, 0x0) dup2(r2, r0) 15:47:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x80002, 0x88) socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) tkill(0x0, 0x3c) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) getpid() 15:47:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:39 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 15:47:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 617.903142][ T32] audit: type=1804 audit(1584287259.966:237): pid=29453 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir000956661/syzkaller.pfszJu/347/file0" dev="sda1" ino=17956 res=1 15:47:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000003740)=""/4090, 0xffa}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r1 = dup(0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x1014a, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000080)=""/26, 0x1a}], 0x1) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r6, &(0x7f0000000040)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb922de747cf6acf7a5f375e5807d1145b6a7c", 0xfec0}], 0x1) shutdown(r5, 0x0) shutdown(r2, 0x0) 15:47:40 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)="03", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, &(0x7f0000000440)=""/243, 0x23d, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 15:47:40 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r4, 0x0) dup2(r2, r0) 15:47:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000002600)=""/4105, 0x1009}], 0x4}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf8, 0x0, 0x0, 0x800e00546) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000100)=""/23, 0x17}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x100000000000010f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xcf1c, 0x0, 0x0, 0x800e00551) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) shutdown(r3, 0x0) r5 = dup(r1) shutdown(r5, 0x0) 15:47:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000002600)=""/4105, 0x1009}, {0x0}, {0x0}], 0x7}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf8, 0x0, 0x0, 0x800e00546) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000100)=""/23, 0x17}, {0x0}, {0x0}, {0x0}], 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xcf1c, 0x0, 0x0, 0x800e00551) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) shutdown(r3, 0x0) r5 = dup(r1) shutdown(r5, 0x0) 15:47:41 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r4, 0x0) dup2(r2, r0) 15:47:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000002600)=""/4105, 0x1009}], 0x5}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf8, 0x0, 0x0, 0x800e00546) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000100)=""/23, 0x17}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x100000000000010f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xcf1c, 0x0, 0x0, 0x800e00551) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) shutdown(r3, 0x0) r5 = dup(r1) shutdown(r5, 0x0) 15:47:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f0000000080)=""/15, 0xf}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xc) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb922de747cf6acf7a5f375e5807d1145b6a7c", 0xfec0}], 0x1) shutdown(r2, 0x0) 15:47:41 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, 0xffffffffffffffff, 0x0) dup2(r2, r0) 15:47:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:42 executing program 2: r0 = dup(0xffffffffffffffff) recvfrom$unix(r0, &(0x7f0000000680)=""/4096, 0x1000, 0x60084, &(0x7f0000000000)=@file={0xa}, 0xa) dup(0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f00000004c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000140)=""/15, 0xf}, {0x0}, {&(0x7f0000000480)=""/35, 0x23}], 0x9) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb922de747cf6acf7a5f375e5807d1145b6a7c", 0xfec0}], 0x1) shutdown(r3, 0x0) 15:47:42 executing program 1: 15:47:42 executing program 4: 15:47:42 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, 0xffffffffffffffff, 0x0) dup2(r2, r0) 15:47:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb24", 0x45}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:44 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87fff) open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, 0xffffffffffffffff, 0x0) dup2(r2, r0) 15:47:44 executing program 4: 15:47:44 executing program 2: 15:47:44 executing program 1: 15:47:44 executing program 2: 15:47:44 executing program 1: 15:47:44 executing program 4: 15:47:44 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(0xffffffffffffffff, r0) 15:47:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb24", 0x45}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:45 executing program 2: 15:47:45 executing program 4: 15:47:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:47 executing program 1: 15:47:47 executing program 2: 15:47:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb24", 0x45}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:47 executing program 4: 15:47:47 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(0xffffffffffffffff, r0) 15:47:47 executing program 4: 15:47:47 executing program 2: 15:47:47 executing program 1: 15:47:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b", 0x67}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:48 executing program 4: 15:47:48 executing program 2: 15:47:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:50 executing program 1: unshare(0x400) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 15:47:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b", 0x67}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:50 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0xc018620c, 0x722000) 15:47:50 executing program 4: unshare(0x400) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 15:47:50 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(0xffffffffffffffff, r0) [ 628.826966][T29934] binder: 29930:29934 ioctl c018620c 722000 returned -14 15:47:51 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d06, &(0x7f0000000080)) 15:47:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="05030000000000000000040000000c000180080003000100000094d98ebda71de7e01c1ee85bc333197d52ca908b4c7b07737c402a5097d6bc2dbc929e233b75a2d48437e5cff04a479b17c472dcac64b2ebd4628455df92409dfa11cc6110eb95f82c72195cf98476e7f84c7b0a2d6092e79b27d7e4e236d90c6e8844f6b9221cb8f1adb98744a01d7706fead91584eb487e9677cd02d8550a1a854bf19cb51595565ae6dce0ef5751dff42986c"], 0x20}}, 0x0) 15:47:51 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000680)='/dev/snapshot\x00', 0x2, 0x0) 15:47:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b", 0x67}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f21a31d2000a001a404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 15:47:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b5b325d"], 0x4) [ 629.806699][T29965] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 15:47:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getxattr(0x0, 0x0, 0x0, 0x0) 15:47:53 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r1, 0xffffffffffffffff) 15:47:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710", 0x78}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:53 executing program 4: unshare(0x400) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:47:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x48, 0x0, 0x2, 0x46a}) 15:47:54 executing program 2: socket(0x1e, 0x3, 0x0) 15:47:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710", 0x78}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:54 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0045103, &(0x7f0000000180)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 15:47:54 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x2) setresuid(r1, r1, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x2) setresuid(r3, r3, 0x0) 15:47:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b703000003000000bea30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:47:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710", 0x78}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:55 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@dev, 0x0, 0x2b}, 0xa, @in=@remote}}, 0xe8) 15:47:55 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r1, 0xffffffffffffffff) 15:47:55 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0045103, &(0x7f0000000180)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 15:47:55 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x24044001, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmmsg$inet(r0, &(0x7f0000007a40)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000c00)="a0", 0x1}], 0x1, 0x0, 0x0, 0x80b50000}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)="d6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)='V', 0x20c49a}, {&(0x7f0000000ac0)='C', 0x1}, {&(0x7f0000001c00)="16", 0x1}, {&(0x7f0000000280)='@', 0x1}, {&(0x7f0000001cc0)="e4", 0x1}, {&(0x7f0000000180)="86", 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f00000021c0)='Q', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000002340)="1a", 0x1}, {&(0x7f0000002380)='k', 0x1}, {&(0x7f0000002440)="1a36898404fcd419d9d40b67f7a61a85b41845a085cad18a08db4ef236471ad1d3fc84b8f9e948cb97146e699e42982aa0c4d45877cb7e715a7ba3f49d3fdc9ca255b6726f3aa83fe25c98f7530180852880404cb612c5484f7dd4c715bb1dbc6e47bb67d963316f2f775686d7b14510dc947d3a850ed08688778963a8c93cd86fef8466bbbe3e3c63c3b40c526614a63252ec03ee6b5789438fa84e40edc2cf3f398b8109fb43ee58ead47e4d6ee86c8915063932dab4189eb2381a29e440c6f70bcd7b5a2370daa85deb24be62dd66b5cbcf0add7b6b6f1a9b459786d5182eed36e45f0d0512303824ce299ca150c4c140b77aea207245820945cf37b35a09b127018de34f93c7faf308800e3dbf3619e19c2d29367dc576ef486ecde1998fadc5505a9b27160fbf7e75bcabdff4008f15085ed2d0a9c5e62161849df19c4c7d2afc303221ec48f019a8f2954769783daddc89c937a7fa64f9141436c9eaea8ff17cd99d9a328727d847612bfe72d51b2bc75ef22a88444a6052dc40ed06c81eb156669244562ff2de1e31b06e3b9f77a2e547dd0288ef8177fb3496fea0758ed01c6773f98590ff6ca7a293830431579fe2f61c4bd3812f1790727b1dc8f7dc5047d3fe2eba8174f27fc66e224831f9ced08c056931141461d8967daf8725beba085f860a1fcdde3d8fd8a504210086586d8c276e2a8f08d3617ba4dec7efc5b34432a7336d776b9be3b393d21060a875306d1a48f700de002220045333e12aa9687a6d6e70b576e15eb2daf31e4f6c42ce31d6c7cd171b5ea9cc60411438343a1cf36aac6f49255f887d4d0efc0d0015447a80eb239b097b408e9c749f83afc732e1859e5080cf6f610cbb504e9e03d59202a46f253a6275cb7da845d046d19fe4c1483bf61f59b9caf11ed917a78cf209cd3110b6b0ab95d3bb708d0addf52d15548185426a4b196e4e361784c9f6cf1dd2793941d50ed334bc5db03f73791206bc5a4eba02f9869d6723c12ea58b598acce1cfb543f9fd552790aafbb8217d348c4b43a594d7c86e2bfd9155b977aabef7cade94625d878cd0c668d3603911d976886a5d8279dc52afea8d4a5004ccec770c5c4c0c2aa3b60d98d399076c76f08b908b239f5eca25e082e2bae8adfab446f5d8dd8a50bc78e488f2220c8551a2dc37e9f8063be987456eb005d679ebb40614dcf1f2526a2ebf30a818ad3501a328ca13b31e8f11fb4fcb5cabb8654bf55b180264c77017dd2fed55e0fb6453302d2aba7fe5b9d831775d9d455f5bdafdb691f101dc40bb3d67e2ba2694d189223cee1e58a7ca53886902da05488bd2b7de8b2980a664602ea518210114ba72a8bb6dabc069ad55355fbbcf865a9f4071f9e7e29304634b63de552a894c57e1bf1c1038fea722172f0596cb4a725b06c5128ed332270bd3fd04299d07e48a941232f0506f93cf04291f54ca9a2a001b08f6c15bec8d9a0a4fceccb38427a04b9feba5c7ddc0fea96a2530e10592d53d03f6f5c2a038013761a28f0a0878a3b6593b5115a6bcc8e0951ee8a9f2a864f3dec94b617900da9c652c2435a0cb89be1e5c3a82535d8d361ec1914009c023656ebe70c114921fb13200a2ff3dd561cec562c988b8dba8cecab7220ba44d3e338406f5f7d19a4362a591b871d5799977cd6763013a263bc8388b76dfc827aa1604a32812b961220ae124dda15db50fbdb43d7cdcaa4f15c66ceaf566bf05e94d744d2a92e623de79d3dda58b1558f98301ba34dd01ecbe2d3d82b86cd1153f60aff12cc7e9aa3df5d3a092a0a83fa0705a4797d03d7e407a22341bad67fdb3a7678b6c32257e6703c186cf933d133d06d862457b5ee5133772728ffa5910802b1781ba5a0bd7bd54d0facf2b9a26100ac94e3a9b5678016f625e34e5c4802361ad2419e577034354b15b86bb0a2bba3e696634a8e4f2dd2c4b4fb96f86a49776352bb8868e7d004443b7952a48753714f1ff4a9361725c4491b5e35ce8ead01614bb3ba713089721b352aa45172a9ee00fbcf0edfe0d84cba81342be484e654d7ee24455f38d916a8768338e8cfd284e3fceb6db3148731d59ad80895ac2000419cc40e1a41a66f2f6593fd5622358197b9e08a9779ffc10f0307beaeb7132f73a93ab36b941a7fc951f3dde01a39f629d9e0f846eb3fdc55ed67a98e93311574fe6701876a2de6f1f3a551dc121705b62d4372c9cd3d39c637d5656eedd54aeffbf44d880c1317616c79c1847b0f2404728b9b9022defec5967c5199ef62cd61c58216dc2624bfe748cfc3bc94e1435939e74897946086c73052621e60a47c2352bc120367efd2cfa18033e9627ef3761daf396468c276a6973999abd1db23a0ae6c1ebcb62aabde721bfebd58ba02a5165d0e164dbe92d3f9cfc9ded7b1d7ca95a1d69eed8aaeaf8cc48e289d10c84a9b96498b281c3b02c19a93c4eb062970daf8fca6d50faa51efcadbd5ebc90c667e354f8bc4ce930aa1964e422a056dd207096da44bb02a1a1a8a2506484e9005e9d95e65cf50ae0870bfe0506acbaa305c5b0c9e690bedfea3c78d74ef8f1c595ccc31a678c684a5a15a01522ab6fe5a98d671d507a4ca77a08086caee8605668349c46c53fef6ef9ce346e2e8710a13273f0a3633f23c28cec086e593e66871db4285feb03dd6e33903a63397cf67bc1ffd19907e14acaf343996434231120257aa71f0649b5709f8a125c4f165207b81b35ff6d04e0f865389f34c1cd287b8844811864ccd20c1c1b07836bf8ec4e4e6b4b47e5a72f9a89c65807c9a8ba87e3de03015ccc04f53ab23bcf87214841b0623ff216b3c50767c143f1b286c453965743f03dca948b5a015895a82fd2a581a28a6701546e9c83545e7c0fc1806599105d94e7c987aab4e466ea9ecad267e2a2f28973ed609249bb998b022efaf972bca0e21259ae188d6ac5d29a4efc0b92d5ad6735ce7e5fa499eb02387bc5ea84b136dfbc4c8a3dd8f5f3f4dde1df9aea146a56886d3b848e36ad3512cde9ae3f42f85e57610582980685f1a26b96b56e8dcc9f01ca72fca889adfb85a9d85850f82c6d6ddb7dad47499a874189d211df6a5227e138c0cc373ca25a0c4157993072d5372d5cf13a5f2a523d2aeda445d3a9b1437bafcb47991956d1d1802e7fecc3f4c58eee14a39fb0e73e12116befb2a4fe397f59f9ff0e3df0d1f67658a91ca4f9867f3d1e2e7a015c010f64c0ce3958430f53e7887bad19ec2d204859240b5184ee43ea81ad3880f14cf72d3e2ac0b7794c6c91b37f77fdc7f0bcab4f7c20463ba40a369d8cabf2f7e83c65c508a901860e320cffcc143a28248e2b1463eee7cd69b41eff2878087e0ea38f58e65a1a8b7b9abeee2ce67a465878c6e13e377ffac74c924dc2908d3bb3e2cc71ef73f00bdfef1540efbf11ded3e994312b8231a8342b6a15cd12499fd0a7f58e82e6b8157de8b982f8b650b54870a1df3b457cb01867d0a7b99a6cabd1e11de3890d20153877501f7e276798ac7c9074c1f9fc089d46581dffd7d37c8f4ec7fcef7fbd5dfba6d8b907e738141c622331906959c4058335c99889209a40e8487e10c551a3668a5f3583671a351dcf37e04813bb71a7dc26f4a497b49d58260c96a88f57996a9673850b749087baf4b1b42108c3b9d6187187ed31b3cc4e1204edffde60395157d03d054eefe4a96e00b85c60ecf2c3d8c79859ce6ccfd05461d09506784fcebd22ba837dd6858dcf23f5f2f6b8af73442269a3114d65e5224b2ec3e12a096eb5ac24967d2a193de2dcc5e3ab14d21d389e2dcd5a85e37822e69fc3002f98dd02aac9b967fd4bd74b6ddf12331d97d2ca72f65aeea944922a4f3cc950b0d33985a25536f048a1bd9fcacc22cb067f6d997cd3b885ad583b171346e34fc69c0a67b955c68984cf023926204ce8ab2bcad62486005081c056a5343411fbbc81a53d440101d52c7aa78140e2ae839b89d0c37b9a95aeba58600b737db4f2c4feec57a86d8dbded856fd9558c836c831c2759ab1625bb5ccf9acb60a167c507fc392f1171952b2284c2c56aae09a4d8e6b88e76feb807aaf0f40e2ecff2b5a3fc46ab60434573bb9aef19ad85dce78b6792b93fd0f3036e227cba0d4eb5aa70041b05f7a1e1a0d83d219071c74e0a1ccf13a45338d089751255a2a8e56ee53123042a386b410783a972a3364a8daace994dfc02d341c2e50bef67a4533a2dbf983291b89fddd53501bd590b8e", 0xbc1}, {&(0x7f0000003440)="1b", 0x1}, {&(0x7f0000000000)="9e", 0x1}, {&(0x7f0000003500)="dd", 0x1}, {&(0x7f0000000300)="c1", 0x1}, {&(0x7f0000003640)='\x00', 0x1}], 0x8}}, {{0x0, 0x0, &(0x7f0000005e00)=[{&(0x7f00000037c0)='U', 0x1}], 0x1}}], 0x6, 0x6041054) connect(0xffffffffffffffff, 0x0, 0x0) 15:47:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:47:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x2}) 15:47:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed", 0x81}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:47:55 executing program 2: unshare(0x400) r0 = socket(0x10, 0x2, 0x0) connect$x25(r0, &(0x7f00000000c0)={0x9, @remote={[], 0x0}}, 0x12) 15:47:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:57 executing program 4: unshare(0x400) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 15:47:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed", 0x81}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:47:57 executing program 2: unshare(0x400) flock(0xffffffffffffffff, 0x0) 15:47:57 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87fff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1c103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) dup2(r1, 0xffffffffffffffff) 15:47:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x24044001, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmmsg$inet(r0, &(0x7f0000007a40)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000c00)="a0", 0x1}], 0x1, 0x0, 0x0, 0x80b50000}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)="d6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)='V', 0x20c49a}, {&(0x7f0000000ac0)='C', 0x1}, {&(0x7f0000001c00)="16", 0x1}, {&(0x7f0000000280)='@', 0x1}, {&(0x7f0000001cc0)="e4", 0x1}, {&(0x7f0000000180)="86", 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f00000021c0)='Q', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000002340)="1a", 0x1}, {&(0x7f0000002380)='k', 0x1}, {&(0x7f0000002440)="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", 0xbc1}, {&(0x7f0000003440)="1b", 0x1}, {&(0x7f0000000000)="9e", 0x1}, {&(0x7f0000003500)="dd", 0x1}, {&(0x7f0000000300)="c1", 0x1}, {&(0x7f0000003640)='\x00', 0x1}], 0x8}}, {{0x0, 0x0, &(0x7f0000005e00)=[{&(0x7f00000037c0)='U', 0x1}], 0x1}}], 0x6, 0x6041054) 15:47:58 executing program 2: unshare(0x400) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 15:47:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed", 0x81}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:47:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:47:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f00000000c0)) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:47:58 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0xc0046209, 0x77007a) 15:47:58 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:47:59 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r0, 0xc04064aa, &(0x7f0000000100)={0x0, 0x0}) 15:47:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48", 0x85}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:59 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:47:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) [ 637.304278][T30351] binder: 30331:30351 ioctl c0046209 77007a returned -22 15:47:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48", 0x85}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:47:59 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x24044001, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmmsg$inet(r0, &(0x7f0000007a40)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000c00)="a0", 0x1}], 0x1, 0x0, 0x0, 0x80b50000}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)="d6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)='V', 0x20c49a}, {&(0x7f0000000ac0)='C', 0x1}, {&(0x7f0000001c00)="16", 0x1}, {&(0x7f0000000280)='@', 0x1}, {&(0x7f0000001cc0)="e4", 0x1}, {&(0x7f0000000180)="86", 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f00000021c0)='Q', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000002340)="1a", 0x1}, {&(0x7f0000002380)='k', 0x1}, {&(0x7f0000002440)="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", 0xbc1}, {&(0x7f0000003440)="1b", 0x1}, {&(0x7f0000000000)="9e", 0x1}, {&(0x7f0000003500)="dd", 0x1}, {&(0x7f0000000300)="c1", 0x1}, {&(0x7f0000003640)='\x00', 0x1}], 0x8}}, {{0x0, 0x0, &(0x7f0000005e00)=[{&(0x7f00000037c0)='U', 0x1}], 0x1}}], 0x6, 0x6041054) 15:47:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3ba, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) 15:47:59 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:48:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48", 0x85}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:01 executing program 1: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:48:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 15:48:01 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x24044001, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmmsg$inet(r0, &(0x7f0000007a40)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000c00)="a0", 0x1}], 0x1, 0x0, 0x0, 0x80b50000}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)="d6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)='V', 0x20c49a}, {&(0x7f0000000ac0)='C', 0x1}, {&(0x7f0000001c00)="16", 0x1}, {&(0x7f0000000280)='@', 0x1}, {&(0x7f0000001cc0)="e4", 0x1}, {&(0x7f0000000180)="86", 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f00000021c0)='Q', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000002340)="1a", 0x1}, {&(0x7f0000002380)='k', 0x1}, {&(0x7f0000002440)="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", 0xbc1}, {&(0x7f0000003440)="1b", 0x1}, {&(0x7f0000000000)="9e", 0x1}, {&(0x7f0000003500)="dd", 0x1}, {&(0x7f0000000300)="c1", 0x1}, {&(0x7f0000003640)='\x00', 0x1}], 0x8}}, {{0x0, 0x0, &(0x7f0000005e00)=[{&(0x7f00000037c0)='U', 0x1}], 0x1}}], 0x6, 0x6041054) 15:48:01 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d06, &(0x7f0000000000)) 15:48:02 executing program 1: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:48:02 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d06, &(0x7f0000000000)) 15:48:02 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x24044001, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmmsg$inet(r0, &(0x7f0000007a40)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000c00)="a0", 0x1}], 0x1, 0x0, 0x0, 0x80b50000}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)="d6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)='V', 0x20c49a}, {&(0x7f0000000ac0)='C', 0x1}, {&(0x7f0000001c00)="16", 0x1}, {&(0x7f0000000280)='@', 0x1}, {&(0x7f0000001cc0)="e4", 0x1}, {&(0x7f0000000180)="86", 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f00000021c0)='Q', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000002340)="1a", 0x1}, {&(0x7f0000002380)='k', 0x1}, {&(0x7f0000002440)="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", 0xbc1}, {&(0x7f0000003440)="1b", 0x1}, {&(0x7f0000000000)="9e", 0x1}, {&(0x7f0000003500)="dd", 0x1}, {&(0x7f0000000300)="c1", 0x1}, {&(0x7f0000003640)='\x00', 0x1}], 0x8}}, {{0x0, 0x0, &(0x7f0000005e00)=[{&(0x7f00000037c0)='U', 0x1}], 0x1}}], 0x6, 0x6041054) 15:48:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f127", 0x87}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:02 executing program 1: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:48:02 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d06, &(0x7f0000000000)) 15:48:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$set_reqkey_keyring(0xe, 0x7) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007680)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0xc, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002d000700ee00"/20, @ANYRES32=r6, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) 15:48:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:03 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x2) setresuid(0x0, r1, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x2) setresuid(r3, r3, 0x0) 15:48:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f127", 0x87}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 15:48:03 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d06, &(0x7f0000000000)) 15:48:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f127", 0x87}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:03 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x2) setresuid(0x0, r3, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x2) setresuid(r1, r5, 0x0) 15:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 15:48:03 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0xc018620c, 0x10) 15:48:04 executing program 0: ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d06, &(0x7f0000000000)) 15:48:04 executing program 2: r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x18, 0x2, 0x0) connect(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="00182e080000e094fefff7ff009f58c30a51365a56f371ace6c80a2269025e47d02b66f4acf424101438ca80002ffffc93cac8a61778d6fc0b0e08f4b91680a8fc9cdf545c6a992c26050e2e0000000000000070ec322f64bd8680b2ebf7d6af5c5924edec13e578dec8b03faaad94ea26c467d988a2ccd28e9a681669ccb13f75fcca3e0db3857eed1acba30cb6f78f7ad151980e33e5c767bc85bf18aae7ec3b4b54796676ad44ff8007ba41d83582bb022ab3c0fa184aa17b5fd7829029912324f68c6d3fd8f467625c47bc097051ed49251e5414a5e230cde39b1cae2c668db5bb41c717cf5475aba5af4321ae267d3f35f0379acea09687281cff9f30d20b000000000000"], 0x1c) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) 15:48:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e", 0x88}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 642.207169][T30735] binder: 30733:30735 ioctl c018620c 10 returned -14 15:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 642.269103][T30736] binder: 30733:30736 ioctl c018620c 10 returned -14 15:48:04 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self\x00', 0x0, 0x0) syncfs(r0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) 15:48:04 executing program 0: ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d06, &(0x7f0000000000)) 15:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 15:48:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e", 0x88}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:07 executing program 0: ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d06, &(0x7f0000000000)) 15:48:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x4}}}, 0x24}}, 0x0) 15:48:07 executing program 4: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0xf34c}], 0x1}}], 0xffffff1f, 0x0, 0x0) 15:48:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 15:48:07 executing program 0: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d06, &(0x7f0000000000)) 15:48:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 15:48:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e", 0x88}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r1, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='htcp\x00', 0x5) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7868f1eaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf9091a7511bf746bec66ba", 0xfe6a, 0x3, 0x0, 0x27) 15:48:07 executing program 0: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d06, &(0x7f0000000000)) 15:48:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 15:48:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:10 executing program 0: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d06, &(0x7f0000000000)) 15:48:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 15:48:14 executing program 4: 15:48:14 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001a00)={'filter\x00', 0x104, 0x4, 0x3e8, 0x0, 0x1f8, 0x0, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x1f8}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @rand_addr, @remote, 0xf}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x438) 15:48:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 15:48:14 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d06, &(0x7f0000000000)) 15:48:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) [ 652.571135][T31130] IPVS: ftp: loaded support on port[0] = 21 15:48:14 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d06, &(0x7f0000000000)) 15:48:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:48:14 executing program 4: 15:48:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:15 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d06, &(0x7f0000000000)) 15:48:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:48:15 executing program 2: 15:48:15 executing program 4: 15:48:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:15 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x0, &(0x7f0000000000)) 15:48:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 15:48:15 executing program 4: [ 653.795740][ T53] tipc: TX() has been purged, node left! 15:48:16 executing program 2: 15:48:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="d5fc52de489bfcda46e1e39a2ad08840254dfc907e3e614743d93095bdc49416b514dccf296d0f6d0af693b3f25b6e67faf8f310923a735ebfd948d78d035547c852d7201f9b106cfa89c79e72831a2c3ec4701dbfe4c3957359e5b2840317219c0081dfd11b26093e8133bcdd37651d49874e427516654c7ff1dd050267196e08c7e280bdb0e09d93df5de9469006964d1e74a9ab652c19e4b7a8121e8e728e73b4f269dfe194cedd064d82f69a902c87252ac64013f451bab7b027848179524055aa762ca2e8fae8cce36ff9a70b605b45b7024f3be9ff37902d882629be60ec275f9b888d7b37552816ba64f95731f75ecb8ea9c887793386fc85aedfa16b1cc172c651991c0070254040cc43424758cbfa75d3d5bcd189e8b3f9", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:18 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x0, &(0x7f0000000000)) 15:48:18 executing program 4: 15:48:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 15:48:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:18 executing program 2: 15:48:18 executing program 2: 15:48:18 executing program 4: 15:48:18 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x0, &(0x7f0000000000)) 15:48:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 15:48:18 executing program 4: 15:48:18 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d06, 0x0) 15:48:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 15:48:21 executing program 2: 15:48:21 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x14, 0x1, 0x0, "616052eabcab615670171ebe6cde243bbf3da07800"}) 15:48:21 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d06, 0x0) 15:48:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x1e, &(0x7f00000021c0)=""/4117, &(0x7f0000001140)=0x1015) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x4000000032, 0xffffffffffffffff, 0x0) 15:48:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}]}}}]}, 0x3c}}, 0x0) 15:48:21 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d06, 0x0) 15:48:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:21 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x14, 0x1, 0x0, "616052eabcab615670171ebe6cde243bbf3da07800"}) 15:48:22 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x14, 0x1, 0x0, "616052eabcab615670171ebe6cde243bbf3da07800"}) 15:48:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}]}}}]}, 0x3c}}, 0x0) 15:48:22 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0x32) read(r0, &(0x7f0000000580)=""/255, 0xff) 15:48:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x28, r1, 0x1, 0x0, 0x0, {0x6}, [@L2TP_ATTR_IFNAME={0x14}]}, 0x28}}, 0x0) 15:48:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x2}]}}}]}, 0x3c}}, 0x0) 15:48:22 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x14, 0x1, 0x0, "616052eabcab615670171ebe6cde243bbf3da07800"}) 15:48:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x3c}}, 0x0) 15:48:23 executing program 4: ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000000)={0x14, 0x1, 0x0, "616052eabcab615670171ebe6cde243bbf3da07800"}) 15:48:23 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="edbfd8cff53a27968901081f73fba6d628d22e3fdfb7"], 0x16) close(r3) socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000180)=[{&(0x7f00000002c0)="f98ac693ce6908a8aa0eef4a7714c8701ee99c9fb2f10db1528d110ca8393fcff78f3a470ad486f6c8eb6aed923b9c0de59b7bf2ca5356590faf7a", 0x3b}], 0x1) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 15:48:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x11, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 15:48:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 15:48:25 executing program 4: ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000000)={0x14, 0x1, 0x0, "616052eabcab615670171ebe6cde243bbf3da07800"}) 15:48:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x3c}}, 0x0) 15:48:25 executing program 0: r0 = socket(0x10, 0x80002, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x0}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) 15:48:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="b184c931984535ee74c22762ba35bac3cea46256166807d2dda6a45a41647038fb68fafbb5ae9137faacebbd1c0f302eff885192ac46e5ea9a34914dc4af13908221dfdb246a2eed7bf581d0a04d81fa62187ca07f3bbae4833c66e0fddb73daf08a358adb6a4b7be4c8603efebb519c8d3f9b1d112ff710e581746d662183bfed5b314c48f1278e85", 0x89}, {&(0x7f0000000940)="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", 0x11c}, {&(0x7f0000000540)="c28d21fa4f37333b9316dcf553533cc40762986da479f425989b7d1b92785569f0feeddd34270e4cecc069eaea666808c07eedb1245f0b5ade1ea2ea3c8b0520717400e465077d0f5dad2481ee3c", 0x4e}], 0x3, 0xd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 15:48:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x200000000000011, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x6c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x40, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0xc8}}, 0x0) 15:48:25 executing program 4: ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000000)={0x14, 0x1, 0x0, "616052eabcab615670171ebe6cde243bbf3da07800"}) 15:48:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x3c}}, 0x0) [ 663.629272][T31715] ===================================================== [ 663.636275][T31715] BUG: KMSAN: uninit-value in nf_flow_table_offload_setup+0x964/0xac0 [ 663.644704][T31715] CPU: 1 PID: 31715 Comm: syz-executor.2 Not tainted 5.6.0-rc2-syzkaller #0 [ 663.653374][T31715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.663441][T31715] Call Trace: [ 663.666738][T31715] dump_stack+0x1c9/0x220 [ 663.671100][T31715] kmsan_report+0xf7/0x1e0 [ 663.675521][T31715] __msan_warning+0x58/0xa0 [ 663.680019][T31715] nf_flow_table_offload_setup+0x964/0xac0 [ 663.685836][T31715] ? nf_flow_rule_route_inet+0x1d0/0x1d0 [ 663.691461][T31715] ? nf_flow_table_offload_flush+0xa0/0xa0 [ 663.697262][T31715] nf_tables_newflowtable+0x233c/0x3e30 [ 663.702845][T31715] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 663.708641][T31715] ? nf_tables_delobj+0x1990/0x1990 [ 663.713858][T31715] nfnetlink_rcv+0x155e/0x3ab0 [ 663.718655][T31715] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 663.724714][T31715] ? netlink_deliver_tap+0xdb0/0xea0 [ 663.729993][T31715] ? __netlink_lookup+0x8b9/0x980 [ 663.735016][T31715] ? kmsan_set_origin_checked+0x95/0xf0 [ 663.740557][T31715] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 663.746357][T31715] netlink_unicast+0xf9e/0x1100 [ 663.751208][T31715] ? nfnetlink_net_exit_batch+0x280/0x280 [ 663.756929][T31715] netlink_sendmsg+0x1246/0x14d0 [ 663.761878][T31715] ? netlink_getsockopt+0x1440/0x1440 [ 663.767240][T31715] ____sys_sendmsg+0x12b6/0x1350 [ 663.772188][T31715] __sys_sendmsg+0x451/0x5f0 [ 663.776787][T31715] ? kmsan_get_metadata+0x11d/0x180 [ 663.781985][T31715] ? kmsan_get_metadata+0x11d/0x180 [ 663.787173][T31715] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 663.792975][T31715] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 663.799032][T31715] ? prepare_exit_to_usermode+0x1ca/0x520 [ 663.804741][T31715] ? kmsan_get_metadata+0x4f/0x180 [ 663.809929][T31715] ? kmsan_get_metadata+0x4f/0x180 [ 663.815035][T31715] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 663.820843][T31715] __ia32_compat_sys_sendmsg+0xed/0x130 [ 663.826384][T31715] ? compat_mc_getsockopt+0x19a0/0x19a0 [ 663.831917][T31715] do_fast_syscall_32+0x3c7/0x6e0 [ 663.836944][T31715] entry_SYSENTER_compat+0x68/0x77 [ 663.842046][T31715] RIP: 0023:0xf7fedd99 [ 663.846105][T31715] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 663.865707][T31715] RSP: 002b:00000000f5de80cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 663.874112][T31715] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020003e00 [ 663.882081][T31715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 663.890046][T31715] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 663.898029][T31715] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 663.906025][T31715] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 663.914003][T31715] [ 663.916322][T31715] Local variable ----bo@nf_flow_table_offload_setup created at: [ 663.923945][T31715] nf_flow_table_offload_setup+0xba/0xac0 [ 663.929651][T31715] nf_flow_table_offload_setup+0xba/0xac0 [ 663.935348][T31715] ===================================================== [ 663.942261][T31715] Disabling lock debugging due to kernel taint [ 663.948395][T31715] Kernel panic - not syncing: panic_on_warn set ... [ 663.954974][T31715] CPU: 1 PID: 31715 Comm: syz-executor.2 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 663.965020][T31715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.975060][T31715] Call Trace: [ 663.978346][T31715] dump_stack+0x1c9/0x220 [ 663.982685][T31715] panic+0x3d5/0xc3e [ 663.986609][T31715] kmsan_report+0x1df/0x1e0 [ 663.991121][T31715] __msan_warning+0x58/0xa0 [ 663.995628][T31715] nf_flow_table_offload_setup+0x964/0xac0 [ 664.001457][T31715] ? nf_flow_rule_route_inet+0x1d0/0x1d0 [ 664.007083][T31715] ? nf_flow_table_offload_flush+0xa0/0xa0 [ 664.012886][T31715] nf_tables_newflowtable+0x233c/0x3e30 [ 664.018557][T31715] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 664.024387][T31715] ? nf_tables_delobj+0x1990/0x1990 [ 664.029583][T31715] nfnetlink_rcv+0x155e/0x3ab0 [ 664.034381][T31715] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 664.040436][T31715] ? netlink_deliver_tap+0xdb0/0xea0 [ 664.045712][T31715] ? __netlink_lookup+0x8b9/0x980 [ 664.050739][T31715] ? kmsan_set_origin_checked+0x95/0xf0 [ 664.056288][T31715] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 664.062094][T31715] netlink_unicast+0xf9e/0x1100 [ 664.066945][T31715] ? nfnetlink_net_exit_batch+0x280/0x280 [ 664.072675][T31715] netlink_sendmsg+0x1246/0x14d0 [ 664.077619][T31715] ? netlink_getsockopt+0x1440/0x1440 [ 664.082984][T31715] ____sys_sendmsg+0x12b6/0x1350 [ 664.087935][T31715] __sys_sendmsg+0x451/0x5f0 [ 664.092534][T31715] ? kmsan_get_metadata+0x11d/0x180 [ 664.097727][T31715] ? kmsan_get_metadata+0x11d/0x180 [ 664.102919][T31715] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 664.108718][T31715] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 664.114773][T31715] ? prepare_exit_to_usermode+0x1ca/0x520 [ 664.120482][T31715] ? kmsan_get_metadata+0x4f/0x180 [ 664.125587][T31715] ? kmsan_get_metadata+0x4f/0x180 [ 664.130694][T31715] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 664.136497][T31715] __ia32_compat_sys_sendmsg+0xed/0x130 [ 664.142037][T31715] ? compat_mc_getsockopt+0x19a0/0x19a0 [ 664.147571][T31715] do_fast_syscall_32+0x3c7/0x6e0 [ 664.152687][T31715] entry_SYSENTER_compat+0x68/0x77 [ 664.157787][T31715] RIP: 0023:0xf7fedd99 [ 664.161846][T31715] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 664.181443][T31715] RSP: 002b:00000000f5de80cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 664.189848][T31715] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020003e00 [ 664.197817][T31715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 664.205781][T31715] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 664.213738][T31715] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 664.221701][T31715] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 664.231002][T31715] Kernel Offset: 0x2cc00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 664.242628][T31715] Rebooting in 86400 seconds..