Warning: Permanently added '10.128.0.2' (ECDSA) to the list of known hosts. 2020/04/19 14:17:07 fuzzer started 2020/04/19 14:17:10 dialing manager at 10.128.0.105:41163 2020/04/19 14:17:10 syscalls: 2960 2020/04/19 14:17:10 code coverage: enabled 2020/04/19 14:17:10 comparison tracing: enabled 2020/04/19 14:17:10 extra coverage: enabled 2020/04/19 14:17:10 setuid sandbox: enabled 2020/04/19 14:17:10 namespace sandbox: enabled 2020/04/19 14:17:10 Android sandbox: /sys/fs/selinux/policy does not exist 2020/04/19 14:17:10 fault injection: enabled 2020/04/19 14:17:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/04/19 14:17:10 net packet injection: enabled 2020/04/19 14:17:10 net device setup: enabled 2020/04/19 14:17:10 concurrency sanitizer: enabled 2020/04/19 14:17:10 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/04/19 14:17:10 USB emulation: /dev/raw-gadget does not exist syzkaller login: [ 50.920371][ T6738] KCSAN: could not find function: 'poll_schedule_timeout' [ 52.956497][ T6738] KCSAN: could not find function: '_find_next_bit' 2020/04/19 14:17:16 adding functions to KCSAN blacklist: 'generic_fillattr' '__x64_sys_ptrace' 'kauditd_thread' 'generic_write_end' 'page_counter_charge' 'exit_signals' 'blk_mq_get_request' 'futex_wait_queue_me' '__snd_rawmidi_transmit_ack' 'shmem_file_read_iter' 'ep_poll' '__ext4_new_inode' 'ext4_free_inodes_count' 'wbt_done' 'ktime_get_real_seconds' 'copy_process' 'dd_has_work' 'ext4_setattr' 'mod_timer' 'smpboot_thread_fn' '__mpage_writepage' 'n_tty_receive_buf_common' 'echo_char' 'blk_mq_request_bypass_insert' 'generic_update_time' 'poll_schedule_timeout' 'do_nanosleep' 'tick_sched_do_timer' 'kcm_rfree' 'xas_clear_mark' 'tick_nohz_next_event' 'add_timer' 'tick_nohz_idle_stop_tick' 'sit_tunnel_xmit' 'find_get_pages_range_tag' '_find_next_bit' 'run_timer_softirq' 'do_exit' 'blk_mq_sched_dispatch_requests' 'ext4_writepages' 'ext4_mark_iloc_dirty' '__find_get_block' 14:20:36 executing program 0: [ 253.674522][ T6742] IPVS: ftp: loaded support on port[0] = 21 14:20:36 executing program 1: [ 253.748371][ T6742] chnl_net:caif_netlink_parms(): no params data found [ 253.903179][ T6742] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.921288][ T6742] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.941268][ T6742] device bridge_slave_0 entered promiscuous mode [ 253.949297][ T6742] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.964534][ T6742] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.972996][ T6742] device bridge_slave_1 entered promiscuous mode [ 253.993639][ T6742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.004898][ T6742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.027587][ T6742] team0: Port device team_slave_0 added [ 254.028872][ T6866] IPVS: ftp: loaded support on port[0] = 21 [ 254.035555][ T6742] team0: Port device team_slave_1 added 14:20:36 executing program 2: [ 254.057271][ T6742] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 254.064366][ T6742] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.091501][ T6742] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 254.106432][ T6742] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 254.114627][ T6742] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.143416][ T6742] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 254.213216][ T6742] device hsr_slave_0 entered promiscuous mode [ 254.261451][ T6742] device hsr_slave_1 entered promiscuous mode 14:20:37 executing program 3: [ 254.429670][ T6918] IPVS: ftp: loaded support on port[0] = 21 [ 254.540425][ T6981] IPVS: ftp: loaded support on port[0] = 21 [ 254.550677][ T6866] chnl_net:caif_netlink_parms(): no params data found 14:20:37 executing program 4: [ 254.663704][ T6742] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 254.736641][ T6742] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 254.835197][ T6742] netdevsim netdevsim0 netdevsim2: renamed from eth2 14:20:37 executing program 5: [ 254.891030][ T7115] IPVS: ftp: loaded support on port[0] = 21 [ 254.916411][ T6742] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 255.019967][ T6866] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.030173][ T6866] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.039082][ T6866] device bridge_slave_0 entered promiscuous mode [ 255.054354][ T6981] chnl_net:caif_netlink_parms(): no params data found [ 255.066624][ T6918] chnl_net:caif_netlink_parms(): no params data found [ 255.083419][ T6866] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.090526][ T6866] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.099269][ T6866] device bridge_slave_1 entered promiscuous mode [ 255.135250][ T7279] IPVS: ftp: loaded support on port[0] = 21 [ 255.177715][ T6866] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 255.200247][ T6866] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 255.268543][ T6866] team0: Port device team_slave_0 added [ 255.279678][ T6866] team0: Port device team_slave_1 added [ 255.288421][ T6918] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.295680][ T6918] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.303486][ T6918] device bridge_slave_0 entered promiscuous mode [ 255.311621][ T6918] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.318663][ T6918] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.326410][ T6918] device bridge_slave_1 entered promiscuous mode [ 255.348305][ T7115] chnl_net:caif_netlink_parms(): no params data found [ 255.387498][ T6866] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 255.394855][ T6866] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.421408][ T6866] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 255.437179][ T6866] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 255.444343][ T6866] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.470553][ T6866] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 255.483324][ T6918] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 255.494763][ T6918] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 255.504259][ T6981] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.511702][ T6981] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.519537][ T6981] device bridge_slave_0 entered promiscuous mode [ 255.527570][ T6981] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.534686][ T6981] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.542576][ T6981] device bridge_slave_1 entered promiscuous mode [ 255.570447][ T6918] team0: Port device team_slave_0 added [ 255.596973][ T6918] team0: Port device team_slave_1 added [ 255.643177][ T6866] device hsr_slave_0 entered promiscuous mode [ 255.671558][ T6866] device hsr_slave_1 entered promiscuous mode [ 255.731270][ T6866] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.738833][ T6866] Cannot create hsr debugfs directory [ 255.744933][ T7279] chnl_net:caif_netlink_parms(): no params data found [ 255.760622][ T6981] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 255.770676][ T6918] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 255.777756][ T6918] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.805041][ T6918] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 255.819095][ T6918] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 255.826304][ T6918] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.853154][ T6918] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 255.874571][ T6981] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 255.921229][ T6742] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.949516][ T7115] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.959012][ T7115] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.967641][ T7115] device bridge_slave_0 entered promiscuous mode [ 256.022948][ T6918] device hsr_slave_0 entered promiscuous mode [ 256.081647][ T6918] device hsr_slave_1 entered promiscuous mode [ 256.121359][ T6918] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 256.128920][ T6918] Cannot create hsr debugfs directory [ 256.135549][ T6981] team0: Port device team_slave_0 added [ 256.144635][ T6981] team0: Port device team_slave_1 added [ 256.150619][ T7115] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.158416][ T7115] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.166286][ T7115] device bridge_slave_1 entered promiscuous mode [ 256.193843][ T7115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.241690][ T7115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.257990][ T6981] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 256.266128][ T6981] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 256.292490][ T6981] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 256.319123][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.327435][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.349246][ T6981] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 256.357336][ T6981] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 256.384569][ T6981] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 256.398231][ T6742] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.409608][ T7279] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.416887][ T7279] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.425130][ T7279] device bridge_slave_0 entered promiscuous mode [ 256.433395][ T7279] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.440553][ T7279] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.448580][ T7279] device bridge_slave_1 entered promiscuous mode [ 256.455576][ T6866] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 256.523783][ T7115] team0: Port device team_slave_0 added [ 256.529507][ T6866] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 256.584587][ T6866] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 256.683468][ T6981] device hsr_slave_0 entered promiscuous mode [ 256.731573][ T6981] device hsr_slave_1 entered promiscuous mode [ 256.771248][ T6981] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 256.778807][ T6981] Cannot create hsr debugfs directory [ 256.785758][ T7115] team0: Port device team_slave_1 added [ 256.799163][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.807573][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.816680][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.823898][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.832010][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.840254][ T6866] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 256.918663][ T7115] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 256.925828][ T7115] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 256.953399][ T7115] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 256.966008][ T7279] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.978756][ T7279] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.988499][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.997850][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.006633][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.013804][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.022014][ T6918] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 257.074830][ T6918] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 257.124124][ T6918] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 257.183218][ T7115] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 257.190322][ T7115] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.216730][ T7115] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 257.235480][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 257.253103][ T6918] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 257.309156][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 257.383741][ T7115] device hsr_slave_0 entered promiscuous mode [ 257.441648][ T7115] device hsr_slave_1 entered promiscuous mode [ 257.481265][ T7115] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 257.488834][ T7115] Cannot create hsr debugfs directory [ 257.495345][ T7279] team0: Port device team_slave_0 added [ 257.533866][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.542568][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.551601][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.560045][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.569330][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.578164][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.586793][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.595453][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.607270][ T7279] team0: Port device team_slave_1 added [ 257.614236][ T6742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.643991][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.700503][ T7279] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 257.709773][ T7279] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.737074][ T7279] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 257.749380][ T6981] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 257.813332][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 257.820779][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 257.836770][ T7279] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 257.844721][ T7279] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.871229][ T7279] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 257.884100][ T6981] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 257.937165][ T6866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.954627][ T6742] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.963677][ T6981] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 258.000247][ T7115] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 258.052913][ T6981] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 258.083869][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.092261][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.102648][ T6918] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.135510][ T7279] device hsr_slave_0 entered promiscuous mode [ 258.191669][ T7279] device hsr_slave_1 entered promiscuous mode [ 258.231319][ T7279] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 258.238907][ T7279] Cannot create hsr debugfs directory [ 258.248344][ T7115] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 258.293635][ T7115] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 258.345543][ T6866] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.364958][ T7115] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 258.404795][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.416198][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.425003][ T2429] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.432214][ T2429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.487694][ T6918] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.495053][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.503311][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 258.512777][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.521632][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.530338][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.539178][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.546718][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.554934][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.563004][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.581331][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 258.590210][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 258.617713][ T7279] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 258.683734][ T7279] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 258.723800][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 258.732176][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.740703][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.749695][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.758546][ T2429] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.765671][ T2429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.773883][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 258.782403][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.804163][ T6742] device veth0_vlan entered promiscuous mode [ 258.818516][ T6742] device veth1_vlan entered promiscuous mode [ 258.826579][ T7279] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 258.863111][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.871212][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.879094][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 258.889132][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.897362][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 258.907860][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.916675][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.928163][ T2429] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.935360][ T2429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.943802][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 258.976766][ T7279] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 259.002861][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 259.010775][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.020708][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.029688][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.038469][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.047525][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.056663][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.065198][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.073959][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.082730][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.090931][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.110679][ T6742] device veth0_macvtap entered promiscuous mode [ 259.121909][ T6742] device veth1_macvtap entered promiscuous mode [ 259.135687][ T6866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.145981][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 259.154658][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.163367][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 259.171823][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.180772][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.204854][ T6981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.240354][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 259.249064][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.257818][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.266606][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.274677][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.284794][ T6742] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 259.295579][ T6981] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.310363][ T6866] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 259.322517][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 259.331036][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.340705][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.348561][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.360113][ T6742] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 259.385164][ T7115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.400434][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.410678][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.419569][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 259.429026][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 259.438499][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.447426][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.456261][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.463524][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.471686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.479634][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.489653][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.497907][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.506978][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.516057][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.523132][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.531991][ T6918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.562056][ T7115] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.571457][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 259.580229][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.621950][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.631002][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.642270][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.650724][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.660078][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.669010][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.677775][ T7784] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.684943][ T7784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.692953][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.701704][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.710551][ T7784] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.717755][ T7784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.725549][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.741299][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.749450][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.758452][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.767514][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.776341][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.784993][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.803237][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 259.814663][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.823460][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.832365][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.853451][ T6981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.864011][ T6866] device veth0_vlan entered promiscuous mode [ 259.873219][ T7279] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.882808][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.890656][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.899554][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.909309][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.918654][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.927750][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.936687][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.945672][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.954848][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.963673][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.971032][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.996121][ T6866] device veth1_vlan entered promiscuous mode [ 260.008396][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 260.018597][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.027119][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.036016][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.044608][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.052627][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.067909][ T6981] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.077190][ T6918] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.087124][ T7279] 8021q: adding VLAN 0 to HW filter on device team0 [ 260.095998][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 260.108141][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.115863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.175456][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.185691][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.194476][ T2930] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.201669][ T2930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.212268][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.220817][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.230966][ T2930] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.238041][ T2930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.248395][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.257218][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.286971][ T6918] device veth0_vlan entered promiscuous mode [ 260.295424][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.305934][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.315346][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.324975][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 260.333989][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.341958][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.349769][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.358163][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.367253][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.375190][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 14:20:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4ac106b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb398dff1db3df9858837458a4ca037605000000b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94608c9a20819e02cc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa2285b6e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e9cfa9d9e57033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400000000000000ff8dc4006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb695cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4d66a09af93a09fab1daae4b518d7a5d95a017864487367d6d7ee7bb0749cacf56cf27409c60fca2e00040000001f76a09933f952000000a9cb6fca7844f9dab530388eb1f43d4abbfc59d6d1b18fe380df4bf024f120bd715d82033f2fb7d8fc9e0d77b294e097e293db58992c0024ab2fd8e5e7fb178f047ba32529bf80496d9648b4d32972cba6f49051cec1bf6f16231bbb90a2d201e5a47811a2278a03bf7700b06fa191ebd3a0c2ef0058ffebd7ccde2480ae40d6156edc4ef81f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f81074192c48c63384f52b8eeb70571e5bbb3e6d2b5eba51aee6f48968981811f832d064048c0e0bbe46984f1f0d0504255c22ee8674053d0e160e525536edf56a93d0a7a6f0889f4ee8964875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875858e083144c642f71cdc8e5634c1360c056430f677ee7ed7ac1f9743786b2fb8d0fcfcc3d36c93230b7b059bc295aa0e38b1c3edc3492b96e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd0c84892c97c80987e5c7954e9f3694d116b01ce0b8ef953de70e7ce0311c8b018956f8a42ca26ab295f1ecf607a8dc38e525f470697dc49b727b98594f6d0c15a1bd46b38845ebca04061bacbf627f798c7f520078fee48f83b5989543729e36a9e1d686bc86cd51704f309130f5347413776a7b7bea3c46c0c4c4b7c27c45057d95ac85ac1cdcee8e6fa31fc02137ed1fb4b21c13b9a2c5e3f7c9ef9c45a314a6f0b9352be92986d63263b1aa5264cb4a82cf080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561d34e4e9851e81d4a355abf43d917c16a2bb0cfb284fcfde901576954ef59e4a658ca431be123b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb463c407f87dafd6199f9ddd1f62da58ca7d3297d6a1bfc5a9aa38a05e70591d5cdab1c268ef3c1984c7c51566cfc2ab6e6fbc99ec206a54fb49056a555414178ef00d8b873c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8ad62edc65828fbb6e279f745d2872f0c08635e465ca443a6a64c7803760880af23fb3f438a5d11fffc96dd1cb951642f1433f65b4e170a62a5f7a8d0f9d5cef0d17289c43d4aee2127f7a343899434594cc23e1c864164e130754b337e520f285dc670a31241bfb43ac6"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff10c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) [ 260.397837][ T6918] device veth1_vlan entered promiscuous mode [ 260.426032][ T7115] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.461780][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 260.472719][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.489375][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 260.503808][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 260.532006][ T6866] device veth0_macvtap entered promiscuous mode [ 260.547852][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 260.560338][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 14:20:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff10c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) [ 260.585446][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 260.605331][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.622872][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.638911][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.661958][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.670269][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.685653][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.700334][ T7279] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 260.712661][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 260.727996][ T6866] device veth1_macvtap entered promiscuous mode 14:20:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff10c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) [ 260.747615][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 260.759235][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.768489][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.804022][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.814389][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.827877][ T6981] device veth0_vlan entered promiscuous mode 14:20:43 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_LINK_CREATE(0xf, &(0x7f0000000040)={r2, r1, 0x73a000}, 0x10) [ 260.872685][ T7279] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.882317][ T6866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.912676][ T6866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.941552][ T6866] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 260.948918][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.970851][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.978872][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.001809][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.010512][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 261.031562][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.039169][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.061774][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.073758][ T6918] device veth0_macvtap entered promiscuous mode [ 261.081866][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 261.108080][ T6981] device veth1_vlan entered promiscuous mode [ 261.118850][ T6866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.131350][ T6866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:20:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000000040)=@raw=[@func, @map_val], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 261.156915][ T6866] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 261.191821][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 261.200660][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.214963][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.223920][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 261.249711][ T6918] device veth1_macvtap entered promiscuous mode [ 261.302931][ T7115] device veth0_vlan entered promiscuous mode [ 261.325473][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 261.337351][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 14:20:44 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000061135c00000000009500000000000000656eabbf8c1b66d2c8e36f07cbaa42153a8baffecaf976f837ef0262739bb2c8c12fc4f76275dcaf9c03bbce01517045d88a41bbb37bfd8e020ac8998b877fd921cf62fb03fe418005012f2fd6b0f2d4912b015c723c9e98e0da9ec3162840e434287bbcfa22cbef309a3001030cd5485374efb7d0e8e134b3ad0e9de13167db50db58119f0d8e8d18918f50e4e1adc0c68bf16ef31f15b7ca64ff4c2141d759f1dedf3325d9f5385d9baf9f10be93921560c7f48328"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xdba3dd835d632db6, 0x10, &(0x7f0000000000), 0xfdd1}, 0x48) [ 261.364331][ T6981] device veth0_macvtap entered promiscuous mode [ 261.390888][ T6918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.410391][ T6918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.424895][ T6918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.444338][ T6918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.474659][ T6918] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 261.491946][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.499875][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.510678][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.520667][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.530675][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.539918][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.556678][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 261.575094][ T6981] device veth1_macvtap entered promiscuous mode [ 261.590451][ T7115] device veth1_vlan entered promiscuous mode [ 261.611708][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 261.620436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.636218][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 261.647177][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.657601][ T6918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 14:20:44 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7301}, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) [ 261.670784][ T6918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.683883][ T6918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.694807][ T6918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.706413][ T6918] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 261.741341][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 261.749411][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.765027][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 261.774542][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 261.784429][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.800690][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.809397][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.850326][ T6981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.868484][ T6981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.878884][ T6981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.892611][ T6981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.914308][ T6981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.936767][ T6981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.962333][ T6981] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 261.979305][ T7279] device veth0_vlan entered promiscuous mode [ 261.990377][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.001030][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.011850][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 262.020400][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.038198][ T7115] device veth0_macvtap entered promiscuous mode [ 262.049069][ T6981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.063138][ T6981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.077944][ T6981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.088553][ T6981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.098570][ T6981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.109442][ T6981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.120806][ T6981] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 262.138657][ T7115] device veth1_macvtap entered promiscuous mode [ 262.152486][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 262.160595][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 262.169383][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.178543][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.190790][ T7279] device veth1_vlan entered promiscuous mode [ 262.224261][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.242954][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.253811][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.264808][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.274910][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.285681][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.295960][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.306921][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.318978][ T7115] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 262.338521][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.347437][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.366076][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.381369][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.392537][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.403455][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.413567][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.424062][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.433954][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.444497][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.455604][ T7115] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 262.474066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.483725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 14:20:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10, 0x0}, 0x200408c4) recvmsg$kcm(r1, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) [ 262.525877][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 262.540040][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.560563][ T7279] device veth0_macvtap entered promiscuous mode [ 262.594354][ T7279] device veth1_macvtap entered promiscuous mode [ 262.649396][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.675208][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.719056][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.764005][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.797015][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.829183][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.839709][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.854244][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.865327][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.878229][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.889604][ T7279] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 262.909109][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 262.927440][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 262.962550][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.971729][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 263.016574][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 263.027809][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.038425][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 263.051099][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.060917][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 263.103453][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.131319][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 263.163042][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.176233][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 263.186948][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.200326][ T7279] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 263.228978][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.252044][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 14:20:46 executing program 2: r0 = eventfd(0xfbfffff8) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) r1 = fcntl$dupfd(r0, 0x0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) write$P9_RGETLOCK(r1, &(0x7f0000000180)={0x23, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 'wlan0'}}, 0x23) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e5e, @dev}, 0x10) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 14:20:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f00000001c0)=[{}, {r0}, {}, {}, {}, {}, {}, {}], 0x8, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x9457, 0x0, 0x0, 0x800e00516) r2 = socket(0x2, 0x1, 0x0) r3 = dup(r2) listen(r3, 0x0) accept$unix(r3, 0x0, 0x0) shutdown(r1, 0x0) 14:20:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f00000000c0)=[{r0, 0x40}], 0x1, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) r2 = socket(0x2, 0x1, 0x0) r3 = dup(r2) listen(r3, 0x0) accept$unix(r3, 0x0, 0x0) shutdown(r1, 0x0) 14:20:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/73, 0x49}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) shutdown(0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x1, 0x0) r3 = dup(r2) listen(r3, 0x0) accept$unix(r3, 0x0, 0x0) shutdown(r1, 0x0) 14:20:46 executing program 0: r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d656d6f7279ea6e7c3c041cec2f6046b6b63f9026f87af91e95a86406b0942f7c07ca1a2d5150bd544c4e406045d4dc2c0c2739a40bee2fa709dc7dedc9a9b42476f8f529cbca00500c36d5a5dbc17cfeb58c3b029d43b137b54898f690b56d95dc48102b092f46"], 0xfa38) 14:20:46 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) read$eventfd(r2, &(0x7f00000000c0), 0x8) write$cgroup_int(r2, &(0x7f0000000740), 0x12) dup3(r0, r1, 0x0) 14:20:46 executing program 2: poll(&(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x9457, 0x0, 0x0, 0x800e00516) r1 = socket(0x2, 0x1, 0x0) r2 = dup(r1) listen(r2, 0x0) accept$unix(r2, 0x0, 0x0) shutdown(r0, 0x0) 14:20:46 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000002c0)) 14:20:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@allocspi={0x100, 0x16, 0x317, 0x0, 0x0, {{{@in=@multicast1, @in=@dev}, {@in6=@empty, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, [@XFRMA_IF_ID={0x8}]}, 0x100}}, 0x0) 14:20:46 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002a80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003780)=ANY=[@ANYBLOB="200000000000000000000000c0000000000000000000000000000000000000001c9d14103472c4b89a4b445b43992afb"], 0x30}}], 0x1, 0x0) 14:20:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002a80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003780)=ANY=[@ANYBLOB=' \x00\x00'], 0x3}}], 0x1, 0x0) 14:20:47 executing program 1: r0 = eventfd(0xfbfffff8) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) r1 = fcntl$dupfd(r0, 0x0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) write$P9_RGETLOCK(r1, &(0x7f0000000180)={0x23, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 'wlan0'}}, 0x23) close(r1) socket$inet_udp(0x2, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 14:20:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002a80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003780)=ANY=[@ANYBLOB=' \x00\x00'], 0x3}}], 0x1, 0x0) 14:20:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 14:20:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'\x00', 0x1}) write$P9_RATTACH(r0, 0x0, 0x0) 14:20:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$FITRIM(r2, 0xc0185879, 0x0) 14:20:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x3}, 0x14}}, 0x0) 14:20:47 executing program 3: socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='cpu&3\n\n\n\n\x00\x00\xc8 \xf4\xb3\xca\f\x1ff\xf0\xed\xe2\xdaX\x96\xe8\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-S\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x02\x00\x80T\"\x00\x80\xff\xff\x03\x00\x00\x00\x00\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x16d) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') sendfile(r0, r1, &(0x7f0000000240)=0xf101, 0x4000000000dc) socket$inet_udp(0x2, 0x2, 0x0) 14:20:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 14:20:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:20:47 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, 0x0}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="ff0001049c84c9e10000d09c27f87e9452fc9f1182b0a843b46e46264028d121dbbf10d4bf29d61ee6daf95894c8431e4e3e2a3d8b43ef27c1d2e5d69819c1f2f083d046e505357a49983c31f7e47bbb2841648aa4fdd5cdd775cf1f9676a602df08004ce80e7c22bba8a0af000000000000000000007bdd81782ce67273bb9e64ee118daaf3d5fa7d259aff401da29c4c166923c59905f44d0bc515e72fd940e180e9b31e8e0b9449403b2b0df4fb3618525ce81f852137e783", @ANYRES16=0x0, @ANYBLOB="2d6885a35f763b546f90c471987100"/29], 0x3}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0xfffffffffffffffc}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1e605, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x60}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x4}) open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:20:47 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x1}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) close(r0) [ 264.991041][ C1] hrtimer: interrupt took 51147 ns 14:20:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) 14:20:47 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x1}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) close(r0) 14:20:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 14:20:47 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2]}}, 0x80, 0x0}, 0x0) 14:20:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) dup3(r5, r1, 0x0) 14:20:47 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, 0x0}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="ff0001049c84c9e10000d09c27f87e9452fc9f1182b0a843b46e46264028d121dbbf10d4bf29d61ee6daf95894c8431e4e3e2a3d8b43ef27c1d2e5d69819c1f2f083d046e505357a49983c31f7e47bbb2841648aa4fdd5cdd775cf1f9676a602df08004ce80e7c22bba8a0af000000000000000000007bdd81782ce67273bb9e64ee118daaf3d5fa7d259aff401da29c4c166923c59905f44d0bc515e72fd940e180e9b31e8e0b9449403b2b0df4fb3618525ce81f852137e783", @ANYRES16=0x0, @ANYBLOB="2d6885a35f763b546f90c471987100"/29], 0x3}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0xfffffffffffffffc}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1e605, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x60}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x4}) open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:20:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @remote}, @source_quench={0x8, 0x4, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}}, 0x3a) 14:20:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='cpu&3\n\n\n\n\x00\x00\xc8 \xf4\xb3\xca\f\x1ff\xf0\xed\xe2\xdaX\x96\xe8\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-S\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x02\x00\x80T\"\x00\x80\xff\xff\x03\x00\x00\x00\x00\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, &(0x7f0000000040), 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) r1 = socket$inet6(0xa, 0x3, 0x6) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000240)=0xf101, 0x4000000000dc) getitimer(0x0, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x2, 0x3, 0x328, 0x0, 0x198, 0x0, 0x198, 0x198, 0x290, 0x290, 0x290, 0x290, 0x290, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x198, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "eace5e89c8401bcaee142a8d52160cbc0b726fe53e8538bbdadc9ddd538e5910669144ed8f5c28b865bd7239f20dcbc7c9a63f5f5cf9b0840bace7a91c206ab34ea211db749a7ebd146b29002d52bd7c314acfa1e784729b6eab7dcde83893eebf5420c4618cbea4171ed61cfbde838a517cdb269c92ba1ab99ffcfc1dc61f80", 0x27}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x388) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000180)={0x89, @multicast2=0xe000000f, 0x0, 0x2, 'sh\x00', 0x0, 0x0, 0xfffffffd}, 0x2c) [ 265.350032][ T8249] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 14:20:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:48 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) r1 = socket$unix(0x1, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x10001) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x124}, 0x9c) [ 265.550626][ T8267] No such timeout policy "syz1" [ 265.566413][ T8267] IPVS: set_ctl: invalid protocol: 137 224.0.0.15:0 [ 265.614921][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 265.630688][ T8267] No such timeout policy "syz1" [ 265.638446][ T8272] IPVS: set_ctl: invalid protocol: 137 224.0.0.15:0 [ 265.648361][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:48 executing program 5: pipe(&(0x7f0000000040)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) time(&(0x7f0000000080)) 14:20:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 14:20:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='cpu&3\n\n\n\n\x00\x00\xc8 \xf4\xb3\xca\f\x1ff\xf0\xed\xe2\xdaX\x96\xe8\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-S\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x02\x00\x80T\"\x00\x80\xff\xff\x03\x00\x00\x00\x00\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, &(0x7f0000000040), 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) r1 = socket$inet6(0xa, 0x3, 0x6) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000240)=0xf101, 0x4000000000dc) getitimer(0x0, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x2, 0x3, 0x328, 0x0, 0x198, 0x0, 0x198, 0x198, 0x290, 0x290, 0x290, 0x290, 0x290, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x198, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "eace5e89c8401bcaee142a8d52160cbc0b726fe53e8538bbdadc9ddd538e5910669144ed8f5c28b865bd7239f20dcbc7c9a63f5f5cf9b0840bace7a91c206ab34ea211db749a7ebd146b29002d52bd7c314acfa1e784729b6eab7dcde83893eebf5420c4618cbea4171ed61cfbde838a517cdb269c92ba1ab99ffcfc1dc61f80", 0x27}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x388) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000180)={0x89, @multicast2=0xe000000f, 0x0, 0x2, 'sh\x00', 0x0, 0x0, 0xfffffffd}, 0x2c) 14:20:48 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, 0x0}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="ff0001049c84c9e10000d09c27f87e9452fc9f1182b0a843b46e46264028d121dbbf10d4bf29d61ee6daf95894c8431e4e3e2a3d8b43ef27c1d2e5d69819c1f2f083d046e505357a49983c31f7e47bbb2841648aa4fdd5cdd775cf1f9676a602df08004ce80e7c22bba8a0af000000000000000000007bdd81782ce67273bb9e64ee118daaf3d5fa7d259aff401da29c4c166923c59905f44d0bc515e72fd940e180e9b31e8e0b9449403b2b0df4fb3618525ce81f852137e783", @ANYRES16=0x0, @ANYBLOB="2d6885a35f763b546f90c471987100"/29], 0x3}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0xfffffffffffffffc}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1e605, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x60}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x4}) open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:20:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1e, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x11, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) futex$FUTEX_WAIT_MULTIPLE(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) 14:20:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 265.935630][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 265.957413][ T8298] No such timeout policy "syz1" [ 265.967684][ T8298] IPVS: set_ctl: invalid protocol: 137 224.0.0.15:0 14:20:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x1}, 0xe) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x11, &(0x7f0000000280)={r3}, &(0x7f00000002c0)=0x18) 14:20:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230e0cb945d293248a3e41779da9b"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:48 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket(0x15, 0x80005, 0x0) bind(r0, &(0x7f00000000c0)=@generic={0xa, "9b479e0000000000005c14d557d502005efe7bb80b86526b510de89aefc9eb6dc2649bdf2b6ab524effc499e522cfbf5ea7aa1033b283235652bf370539dab5b776d5f788b9960df85ddf0e7bcb92ede0eb3db4ed60dd4c3806342de9067b7aecf0000000000000004bdf5aecb8ef68d0797117341f700"}, 0x80) 14:20:48 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1019c2, 0x0) r1 = open$dir(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) fallocate(r2, 0x0, 0x5e00, 0x2cbd) sendfile(r0, r1, 0x0, 0x13000) 14:20:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000080)) [ 266.212438][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 266.348032][ T8328] RDS: rds_bind could not find a transport for 0:5c:14d5:57d5:200:5efe:123.184.11.134, load rds_tcp or rds_rdma? [ 266.398337][ T26] audit: type=1804 audit(1587306049.077:2): pid=8330 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/6/file0" dev="sda1" ino=15757 res=1 [ 266.434018][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 266.503210][ T26] audit: type=1804 audit(1587306049.077:3): pid=8330 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/6/file0" dev="sda1" ino=15757 res=1 [ 266.636661][ T26] audit: type=1804 audit(1587306049.137:4): pid=8336 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/6/file0" dev="sda1" ino=15757 res=1 14:20:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 14:20:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:49 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/drivers\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x2) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffc) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) 14:20:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000003e40)={{0x14}, [@NFT_MSG_NEWRULE={0x20, 0x6, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 14:20:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:49 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) r1 = socket$unix(0x1, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4(r0, 0x0, 0x0, 0x0) 14:20:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:49 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b1", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xb, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 267.077150][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:49 executing program 5: socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1ff, {0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x41}}}, 0x0, 0x4}}, &(0x7f0000000780)=0xb0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='cpu&3\n\n\n\n\x00\x00\xc8 \xf4\xb3\xca\f\x1ff\xf0\xed\xe2\xdaX\x96\xe8\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-S\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x02\x00\x80T\"\x00\x80\xff\xff\x03\x00\x00\x00\x00\x00') perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$caif_seqpacket(0x25, 0x5, 0x5) socket(0x2, 0x3, 0x2) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1df) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000280)=0xa24, 0x4) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x19b002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='schedstat\x00') accept4$inet6(r2, &(0x7f0000000180), &(0x7f00000001c0)=0x1c, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000200)=0x1, 0x4) ioctl$TIOCMSET(r1, 0x5452, &(0x7f0000000000)) r3 = dup(r1) write$P9_RLOPEN(r3, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x2}, 0x80}}, 0x18) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) socket(0x10, 0x2, 0x0) 14:20:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 267.337997][ T8373] ptrace attach of "/root/syz-executor.4"[8370] was attempted by "/root/syz-executor.4"[8373] [ 267.347988][ C0] sd 0:0:1:0: [sg0] tag#2480 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 267.358701][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB: Test Unit Ready [ 267.365182][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.374765][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.376455][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 267.384355][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.404975][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.414556][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.424186][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.433891][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.443485][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.453088][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.462689][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.472286][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14:20:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 267.481873][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 267.491477][ C0] sd 0:0:1:0: [sg0] tag#2480 CDB[c0]: 00 00 00 00 00 00 00 00 [ 267.531688][ T8371] IPVS: ftp: loaded support on port[0] = 21 [ 267.782459][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 267.869093][ T8376] sg_write: process 28 (syz-executor.5) changed security contexts after opening file descriptor, this is not allowed. [ 267.934202][ T8406] IPVS: ftp: loaded support on port[0] = 21 14:20:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 14:20:50 executing program 4: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) clone(0x1918ffd, 0x0, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, 0x0) 14:20:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:50 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/drivers\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x2) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffc) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) 14:20:50 executing program 5: socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1ff, {0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x41}}}, 0x0, 0x4}}, &(0x7f0000000780)=0xb0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='cpu&3\n\n\n\n\x00\x00\xc8 \xf4\xb3\xca\f\x1ff\xf0\xed\xe2\xdaX\x96\xe8\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-S\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x02\x00\x80T\"\x00\x80\xff\xff\x03\x00\x00\x00\x00\x00') perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$caif_seqpacket(0x25, 0x5, 0x5) socket(0x2, 0x3, 0x2) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1df) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000280)=0xa24, 0x4) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x19b002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='schedstat\x00') accept4$inet6(r2, &(0x7f0000000180), &(0x7f00000001c0)=0x1c, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000200)=0x1, 0x4) ioctl$TIOCMSET(r1, 0x5452, &(0x7f0000000000)) r3 = dup(r1) write$P9_RLOPEN(r3, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x2}, 0x80}}, 0x18) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) socket(0x10, 0x2, 0x0) [ 268.238319][ C0] sd 0:0:1:0: [sg0] tag#2481 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 268.248770][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB: Test Unit Ready [ 268.255265][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.264857][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.274463][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.284069][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.293672][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.303344][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.312932][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.322525][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14:20:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 268.332245][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.341844][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.351430][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.361104][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 268.370673][ C0] sd 0:0:1:0: [sg0] tag#2481 CDB[c0]: 00 00 00 00 00 00 00 00 [ 268.381146][ T7] tipc: TX() has been purged, node left! [ 268.388861][ T8437] binder: 8430:8437 ioctl c0046209 0 returned -22 [ 268.403936][ T8435] IPVS: ftp: loaded support on port[0] = 21 14:20:51 executing program 4: 14:20:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:51 executing program 5: 14:20:51 executing program 4: 14:20:52 executing program 2: 14:20:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:52 executing program 4: 14:20:52 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 14:20:52 executing program 1: r0 = socket(0x15, 0x80005, 0x0) bind(r0, &(0x7f00000000c0)=@generic={0xa, "9b479e0000000000005c14d557d502005efe7bb80b86526b510de89aefc9eb6dc2649bdf2b6ab524effc499e522cfbf5ea7aa1033b283235652bf370539dab5b776d5f788b9960df85ddf0e7bcb92ede0eb3db4ed60dd4c3806342de9067b7aecf0000000000000004bdf5aecb8ef68d0797117341f700"}, 0x80) 14:20:52 executing program 4: [ 269.598682][ T8492] RDS: rds_bind could not find a transport for 0:5c:14d5:57d5:200:5efe:123.184.11.134, load rds_tcp or rds_rdma? 14:20:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:52 executing program 2: 14:20:52 executing program 1: 14:20:52 executing program 5: 14:20:52 executing program 4: 14:20:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x3, 0x2f) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:52 executing program 2: 14:20:52 executing program 1: 14:20:52 executing program 5: 14:20:52 executing program 4: 14:20:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:52 executing program 2: 14:20:52 executing program 1: 14:20:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x3, 0x2f) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:52 executing program 5: 14:20:53 executing program 4: 14:20:53 executing program 2: 14:20:53 executing program 1: 14:20:53 executing program 5: 14:20:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x3, 0x2f) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:53 executing program 4: 14:20:53 executing program 1: 14:20:53 executing program 2: 14:20:53 executing program 5: 14:20:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:53 executing program 4: 14:20:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:53 executing program 1: 14:20:53 executing program 2: 14:20:53 executing program 5: 14:20:53 executing program 4: 14:20:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:53 executing program 1: 14:20:53 executing program 2: 14:20:53 executing program 5: 14:20:53 executing program 4: 14:20:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230e0cb945d293248a3e41779da9b"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:53 executing program 1: 14:20:53 executing program 2: 14:20:54 executing program 5: 14:20:54 executing program 4: 14:20:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:54 executing program 2: 14:20:54 executing program 5: 14:20:54 executing program 1: 14:20:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:54 executing program 4: [ 271.666323][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:54 executing program 2: 14:20:54 executing program 1: 14:20:54 executing program 5: 14:20:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230e0cb945d293248a3e41779da9b"], 0x10}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:54 executing program 4: [ 271.899923][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:54 executing program 2: 14:20:54 executing program 5: 14:20:54 executing program 1: 14:20:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230e0cb945d293248a3e41779da9b"], 0x10}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:54 executing program 4: 14:20:54 executing program 2: 14:20:54 executing program 5: 14:20:54 executing program 1: [ 272.145919][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:54 executing program 4: 14:20:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x0, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:55 executing program 5: 14:20:55 executing program 2: 14:20:55 executing program 1: [ 272.416240][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:55 executing program 4: 14:20:55 executing program 2: 14:20:55 executing program 5: 14:20:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x0, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:55 executing program 1: 14:20:55 executing program 4: [ 272.671128][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:55 executing program 2: 14:20:55 executing program 5: 14:20:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:55 executing program 4: 14:20:55 executing program 1: 14:20:55 executing program 5: 14:20:55 executing program 2: 14:20:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x0, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 272.942132][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:55 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:55 executing program 5: 14:20:55 executing program 4: 14:20:55 executing program 2: 14:20:55 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 273.149279][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:56 executing program 4: 14:20:56 executing program 5: 14:20:56 executing program 2: [ 273.339199][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:56 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:56 executing program 2: 14:20:56 executing program 4: 14:20:56 executing program 5: [ 273.585794][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:55 executing program 1: 14:20:56 executing program 1: 14:20:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:56 executing program 2: 14:20:56 executing program 4: 14:20:56 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:56 executing program 5: [ 273.874052][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:56 executing program 5: 14:20:56 executing program 4: 14:20:56 executing program 2: 14:20:56 executing program 1: 14:20:56 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:56 executing program 4: 14:20:56 executing program 5: 14:20:56 executing program 1: 14:20:56 executing program 2: 14:20:56 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:57 executing program 4: 14:20:57 executing program 5: 14:20:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:57 executing program 2: 14:20:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230e0cb945d293248a3e41779da9b"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:57 executing program 1: 14:20:57 executing program 4: 14:20:57 executing program 2: 14:20:57 executing program 5: 14:20:57 executing program 1: 14:20:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:57 executing program 2: 14:20:57 executing program 4: 14:20:57 executing program 5: 14:20:57 executing program 1: 14:20:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:57 executing program 2: 14:20:57 executing program 4: 14:20:57 executing program 1: 14:20:57 executing program 5: 14:20:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:57 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe803, &(0x7f00000000c0)="b9ff10c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 14:20:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000380)=@in={0x2, 0x4e21, @multicast1}, 0x80, 0x0}, 0xfd00) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbffffeffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="0008000000000000695017a035c6f901d29268ee15971807bea637d2c460ce63437e144274cf898f73904138088bb3f40a75ce5c4ed7a7c1902b5ce03c8c9b43ecc1167629725e5cf3de5c5de5b70f"], 0xfdef) 14:20:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:58 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_pid(r1, 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) 14:20:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe00000000850000001f000000b70000000000000095000000000000006623848adf1dd9a764ab51a064e0ff0ca327ab62931d861531fddf0180000071ff31f1622271d5518193e09483c5a020c334f8c76334d8ce8205b01ddaa54d8756ad0f50f2568836077b8471b6b69819782748b376358c33c9753bfd989b1ca58949a54d5827df14feecea46a5c53e9c37251709f1061b973ef07bf7f53ce129a9ecd3b4dd15000000002f98526a0d8cacfb6379b4c5008652a7b4c0974486a8d203bddc62bb2d555a363adbc33b49e13fbd1757b2701acad0e26841a58f9b8cff3f48c9411670c34faf78d1eeffffffffffff0d6c1601001b622f20c41d8418bc4159c14025422835e81c3573af77dbaeb07913476244ffd5b5a924275cb1749289b44e97e7a73f148ae8206afe120c143749b5992e89f42ac52903971b323f60332eb7c9e89aafc50e78e1f62dcbb17f342aab5004d18e4eb69122b42f2173184c1d0fb3287c99b645f6e80e14e5d7c95a"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x80882) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) getpid() [ 275.643302][ T8724] device lo entered promiscuous mode 14:20:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000380)=@in={0x2, 0x4e21, @multicast1}, 0x80, 0x0}, 0xfd00) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbffffeffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="0008000000000000695017a035c6f901d29268ee15971807bea637d2c460ce63437e144274cf898f73904138088bb3f40a75ce5c4ed7a7c1902b5ce03c8c9b43ecc1167629725e5cf3de5c5de5b70f"], 0xfdef) 14:20:58 executing program 5: 14:20:58 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe803, &(0x7f00000000c0)="b9ff10c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 14:20:58 executing program 5: 14:20:58 executing program 1: 14:20:58 executing program 4: 14:20:58 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe803, &(0x7f00000000c0)="b9ff10c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 14:20:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230e0cb945d293248a3e41779da9b"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:59 executing program 5: 14:20:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:59 executing program 1: 14:20:59 executing program 4: 14:20:59 executing program 5: 14:20:59 executing program 1: 14:20:59 executing program 4: 14:20:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:59 executing program 2: [ 276.741162][ C0] net_ratelimit: 10 callbacks suppressed [ 276.741175][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:59 executing program 1: 14:20:59 executing program 4: 14:20:59 executing program 2: 14:20:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230e0cb945d293248a3e41779da9b"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r0, 0x5608) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @local}, 0x10) close(0xffffffffffffffff) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 14:20:59 executing program 2: 14:20:59 executing program 4: [ 277.018240][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:20:59 executing program 2: 14:20:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:20:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:20:59 executing program 4: [ 277.247204][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:00 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:00 executing program 1: r0 = eventfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r0}) 14:21:00 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) 14:21:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 277.435015][ T26] audit: type=1804 audit(1587306060.117:5): pid=8799 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/43/bus" dev="sda1" ino=15876 res=1 [ 277.504169][ T26] audit: type=1804 audit(1587306060.137:6): pid=8799 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/43/bus" dev="sda1" ino=15876 res=1 14:21:00 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) 14:21:00 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@part={'part'}}]}) 14:21:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:00 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230e0cb945d293248a3e41779da9b"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:00 executing program 1: r0 = eventfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r0}) [ 277.565044][ T26] audit: type=1804 audit(1587306060.137:7): pid=8799 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/43/bus" dev="sda1" ino=15876 res=1 [ 277.591855][ T26] audit: type=1804 audit(1587306060.187:8): pid=8799 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/43/bus" dev="sda1" ino=15876 res=1 14:21:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230e0cb945d293248a3e41779da9b"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 277.702298][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 277.741210][ T8819] hfs: can't find a HFS filesystem on dev loop2 14:21:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:00 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) 14:21:00 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) [ 277.789328][ T26] audit: type=1804 audit(1587306060.467:9): pid=8826 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/44/bus" dev="sda1" ino=15883 res=1 [ 277.847541][ T8819] hfs: can't find a HFS filesystem on dev loop2 14:21:00 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) [ 277.881372][ T26] audit: type=1804 audit(1587306060.507:10): pid=8826 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/44/bus" dev="sda1" ino=15883 res=1 14:21:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 278.005777][ T26] audit: type=1804 audit(1587306060.507:11): pid=8826 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/44/bus" dev="sda1" ino=15883 res=1 14:21:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) 14:21:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:00 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) [ 278.109295][ T26] audit: type=1804 audit(1587306060.567:12): pid=8826 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir282004360/syzkaller.eOrQZq/44/bus" dev="sda1" ino=15883 res=1 14:21:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 278.265638][ T26] audit: type=1804 audit(1587306060.717:13): pid=8837 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/44/bus" dev="sda1" ino=15876 res=1 14:21:01 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 278.332473][ T26] audit: type=1804 audit(1587306060.787:14): pid=8837 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/44/bus" dev="sda1" ino=15876 res=1 14:21:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000000000000095000000000000001c26d2bff0fa454225b2efe59bb842889c95ef1ba79618689974e65251a831de1911e7ce9427b8fe7c4b194b4a958f49a32d87a43133851864cf48cbb64f52c8197a991a5ad5b2b132abe5a4ff9e3d04d6bd832c0cd77ee508b4f79ce77748c4d0f7074eb8fc284872b4dcc8c365d99548b4fc3d8640f90c0c6b060f2a67d98f03848c8e3868229bba8647ca373da549ae6c972806fc7de1d287ed25f137d95275fbd100dd1046e9b0febe762635bd20f62a827bc127fd8969a01c5a6deca9cedd561e7d955df8a6cda5047fbead7ee7e76d4b870024b85bfc7f64b4d1a13e79c4fb0b7773bc90cb99eded466d80b384ee396f80910953a83327277c3727ab0f1373f4effda7e880eb5e807e180dd7b2b87ffd5f455dd7ec613366c646f31b60e7197f04403a0382ad7b10ec0750914550713acbf4227d0ac1bc4b4cc097a2a902d050f439ac617e25d0937ed80abb39ee2fa21394026993e4d3ff80ad728c4ffb3058d86b1812066256dd17f462e4c791a0c8dace2c82d5df4e6dd8bfc9768d01b22b53322df86ffe495dd7c1958870dda697a2d6a69f291c52e0df19c4d449415e3751002c1119136df42b45b36106a460a94aded5d9c5fcc0429ebbcb0aa494626e617365d406904a9c56c3f10b47017f7b1f39277a61f397bae3eaef7be500789c99fec84533d2908cc5b804fc3df6f59e71f948dab43a9d34fb8b57f7abd2e4055583e705db21d43389528343a87869d601857e669a53412027c944e2277c628921040f3962c43b7ebd4693d7f361039c934833585bb7ee70f6dfaa5dff1a48dc4148b150f01ff9754f73332f1ef1fb979763d0f0e820536f020071cc5ce39b1664a72e7151fbed54720a073957438c6139f706e2d38e40d810c86caa73e51986d775fda0606621c93b89a9c806"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fbac141410", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000d00), &(0x7f0000000580)=""/76, &(0x7f0000000600)="b28e71c7aae7a4d8eba86ca2b08bb5bc2ed1a97f76b967d0c4644e5575a55c1802596681fe85efa183d02f6e4f588b98b5272838df0a21b2c38bc924426cec0f", &(0x7f00000003c0), 0x0, r1}, 0x38) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x9, 0x29, 0x4, 0x5, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x10000}, 0x0, 0x0, 0x1, 0x4, 0xe00000000000, 0x101, 0x4e47}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) 14:21:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:01 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:01 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x60}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x4}) open(0x0, 0x3d5342, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:21:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:01 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 14:21:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:01 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000000000e558c5986f0000000000000087695931515781ae36a4d148f269399022f5ce7ec3b6d946be4fac9508cce4df4d7015f5590bbfb45e2584f446722053f1502598808b355f7b815bdb22ba86dddc0187f894de7e811484d6ff759944bd09b0f55e7ca54b07bd91ddde8defcea227e56f94ddc8d5d0a848822679c663f344c5e02f38fdcdad2e5cc22b1f090ecf60605fa26c0e48a80a6bd544fa300d066a4d162d7ef85002024faf0831fffbb5f1a12a6f5f158a752eaf25a859b40a57381147cdd7c9fd7ceae30304783fd7f2eec79c49b69a61287b591371f3f60b34470692217a8930a11f0e0c796c587da235e5ed34ce844827033a3bac99ab9498f944fec73001fd8be2b4b36b0b3c9672af727831275017a6d5aff50c0967c22ebf548906138e7dae98da3b8a39bf8800000000000000000000002a025f9c75c0d37e26e97c7bd43800000000339b567e58689a4da64cf31b4ea5066103ba670c2772b548c8f138af7029f1226901c86f510b46e3a027d6135f99b585d0aa73b71cd8e7448f107336ed8a46a35936d5a24a92a4e2be4b78ca3d304e40f3931319f8b3e3f6feebfdcefa894f5b2537fa42349ea25f2f13036d3bc4146643153f24a71060b9c52038f799"], 0x18}}], 0x1, 0x0) 14:21:01 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000065b00"/16], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@gettfilter={0x2c, 0x2e, 0x1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x0, 0xd}}, [{0x8}]}, 0x2c}}, 0x0) 14:21:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040), 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 279.050879][ T2930] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:21:01 executing program 2: setuid(0xee01) syslog(0x0, 0x0, 0x0) 14:21:01 executing program 5: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4066, 0xfe2}], 0x1}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) pipe(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) 14:21:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040), 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:02 executing program 5: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) shutdown(r0, 0x0) 14:21:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040), 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180), 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:02 executing program 5: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="00000000000000001c001a8018000a8014000800fe8800000000f2ffffff000000000001813855066ed4a31a998b60def7806005728fec719c8682191d749dd204c64e10b3ac5070e41656ad3b90c3db72775c8f7f0ef5168f7b29b664ea"], 0x3c}}, 0x0) 14:21:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) [ 279.694153][ T8946] netlink: 'syz-executor.2': attribute type 8 has an invalid length. 14:21:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4066, 0xfe2}], 0x1}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) pipe(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) 14:21:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180), 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:02 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @local}, 0x10) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @random="109b8553d862"}, 0x10) 14:21:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xce, 0x0, 0x0) 14:21:02 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180), 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 280.241414][ T8967] device lo entered promiscuous mode [ 280.256242][ T8960] device lo left promiscuous mode 14:21:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xce, 0x0, 0x0) 14:21:03 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x1}) [ 280.386668][ T8979] device dummy0 entered promiscuous mode [ 280.404060][ T8960] device dummy0 left promiscuous mode 14:21:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x1, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 14:21:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x2}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xce, 0x0, 0x0) 14:21:03 executing program 5: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:04 executing program 5: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0x30, 0x2d, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x18, 0x1, [@m_ipt={0x14, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x4}, {0x4}}}]}, {0x4}]}, 0x30}}, 0x0) 14:21:04 executing program 5: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000001c0)={0x1}) 14:21:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x2}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) [ 281.513119][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x2}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 14:21:04 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, 0x0) 14:21:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) [ 281.798571][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB]}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) 14:21:04 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0x0, 0x1f8, 0x1f8, 0xd0, 0x1f8, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x0, 0x7, 0x42}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ipv6={@dev, @mcast1, [], [], 'dummy0\x00', 'veth0_to_bond\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@remote, @empty, [], [], 'ip6tnl0\x00', 'ip_vti0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "1883"}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420) 14:21:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:04 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, 0x0) 14:21:04 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca41", 0xe3}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xb, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49d3, 0x8001}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 282.037950][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB]}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a3", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000d00), &(0x7f0000000580)=""/76, &(0x7f0000000600)="b28e71c7aae7a4d8eba86ca2b08bb5bc2ed1a97f76b967d0c4644e5575a55c1802596681fe85efa183d02f6e4f588b98b5272838df0a21b2c38bc924426cec0f", &(0x7f00000003c0)="a39922259b95901e52b3e732a933a0e876218914c1ad51be6918405735558d49a62e975dd1fad623fb4f0f14eda1b640a53a36b6b180ca0f8f1ef3314d57a018c70966af7e782903cebfc967ff5d3dc3c0a51b308679162d08e8473e4c875eeab98d73f3b6af580e374917bbdd5e4b41adc058d02519df5d60b1c5bc99342dd56926a8d26070d3df6470628333d7c98eae7e2c5f58eef94ce71127c4ed76041fd249d11b19", 0x0, r1}, 0x38) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xa, 0xb, 0xa, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xe, r1, 0x8, &(0x7f00000002c0)={0x4, 0x1}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xc, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="1800008f0007000000ff", @ANYRES32=r1, @ANYBLOB="00000000000000009595f8fff0ffffff50730c000800000085100000010001009500000000000000"], &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xc, r1, 0x8, &(0x7f0000000680)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x1, 0x7, 0x9, 0x3}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000300)=r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 14:21:04 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, 0x0) [ 282.117069][ T9047] ip6t_REJECT: TCP_RESET illegal for non-tcp [ 282.146262][ T9050] ip6t_REJECT: TCP_RESET illegal for non-tcp [ 282.236961][ T9058] ptrace attach of "/root/syz-executor.1"[9056] was attempted by "/root/syz-executor.1"[9058] 14:21:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 282.276896][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB]}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:05 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)) [ 282.464599][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:05 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)) 14:21:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x10000c}) 14:21:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d"], 0xd1}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 282.667439][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 14:21:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:05 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)) 14:21:05 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x4008066, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2}, 0x3f) sendto$inet6(r0, &(0x7f00000008c0)="c7", 0x1, 0xc005, 0x0, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x8ec0, 0x0) sendto$inet6(r0, &(0x7f0000000040)="f1", 0x1, 0x0, 0x0, 0x0) 14:21:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d"], 0xd1}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f05", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0, 0x12b}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0xd) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 282.886121][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 14:21:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:05 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xce, 0x0, 0x0) 14:21:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100), 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 283.094295][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d"], 0xd1}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@alu]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 14:21:06 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xce, 0x0, 0x0) 14:21:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 283.268461][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:06 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f0600000000000000", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 14:21:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x13a}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 283.939969][ T9153] ptrace attach of "/root/syz-executor.2"[9151] was attempted by "/root/syz-executor.2"[9153] 14:21:08 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4c", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x4}}}]}, 0x34}}, 0x0) 14:21:08 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xce, 0x0, 0x0) 14:21:08 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 14:21:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x13a}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:08 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 14:21:08 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) creat(&(0x7f00000002c0)='./bus\x00', 0x0) lseek(r0, 0x0, 0x4) 14:21:08 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x13a}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 286.204698][ T9175] ptrace attach of "/root/syz-executor.5"[9173] was attempted by "/root/syz-executor.5"[9175] 14:21:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}]]}}}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) 14:21:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 286.245921][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 286.245938][ T26] audit: type=1804 audit(1587306068.927:21): pid=9179 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/61/bus" dev="sda1" ino=15886 res=1 14:21:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) [ 286.379290][ T26] audit: type=1804 audit(1587306068.977:22): pid=9179 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/61/bus" dev="sda1" ino=15886 res=1 14:21:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x16e}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001bc0)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb, 0x1, 'dsmark\x00'}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 14:21:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 14:21:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x16e}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 287.000745][ T26] audit: type=1804 audit(1587306069.677:23): pid=9186 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/61/bus" dev="sda1" ino=15886 res=1 [ 287.138581][ T26] audit: type=1804 audit(1587306069.817:24): pid=9179 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/61/bus" dev="sda1" ino=15886 res=1 [ 287.166146][ T26] audit: type=1804 audit(1587306069.817:25): pid=9189 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/61/bus" dev="sda1" ino=15886 res=1 [ 287.236637][ T26] audit: type=1804 audit(1587306069.817:26): pid=9223 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/61/bus" dev="sda1" ino=15886 res=1 14:21:10 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) creat(&(0x7f00000002c0)='./bus\x00', 0x0) lseek(r0, 0x0, 0x4) [ 287.314310][ T26] audit: type=1804 audit(1587306069.937:27): pid=9227 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/61/bus" dev="sda1" ino=15886 res=1 [ 287.404931][ T26] audit: type=1804 audit(1587306070.087:28): pid=9233 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/62/bus" dev="sda1" ino=15886 res=1 [ 287.453454][ T26] audit: type=1804 audit(1587306070.117:29): pid=9233 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/62/bus" dev="sda1" ino=15886 res=1 14:21:10 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:10 executing program 4: perf_event_open(0x0, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) syz_mount_image$tmpfs(&(0x7f0000000900)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x8, &(0x7f0000000740)=[{&(0x7f0000000300)="c3f4648db609e2015421be9902eef73ec7f99f7eb0c80246bf83e3cf0a28a43ec7dbd903ed8e5cb7521ff067fea439ee120e07a18fa6647073a05b476c5d2684882c669da5ba3a8eceb4ae795c02dc4726f171a505a00655ecfe6672061efd32bdd7ffe0aa140ac3f99698c5ca733f4b73b2748bb885859f4452eaf705d086679b", 0x81, 0x100000001}, {&(0x7f0000000400), 0x0, 0x45}, {&(0x7f00000004c0)="cfecdea21021005378417f1e7911ff5704318b9bf9dac0bae5f47b1e552ebc7abadd52055f740e7c", 0x28, 0x2}, {&(0x7f00000005c0)="03c938b8157dc5b56b2f72d0a1342202f876450d077dc2c50b34b2b8ce5225c46e0221cf336199e3e803a028a97b58aec01e9ccb76698dcac866ebbf80afb147bf9d0a1f4a30843ea8d7fc4e882c7881e745f2602d83014dc248781b6166d3686a6015ecd90de3eb8a488fb06264d3002d837cca4effc88365c6", 0x7a, 0x1}, {&(0x7f0000000640)="805674f55fb0225caa03a2f757f9751927ef6f924b726a8852d1410061a923ee4ab70878bdf8c2c75a4bf10f7fc8e4e95f24bc56f8591b4ad7712f71f6c773b2b61c0a5403105e9540dd0e1fa0317c3b5f55e09d341f5b8159794b75deed629ee1770ba60bc54feb51a1a5b2fb99e3f5aaf8d2f841ccd089f461f8fdf1922d0ec29c6b5cf0df71b3d5e6378c1ac23b4a8a30d32d11834a010c91f9ebb8c710efdda6d088454b459b409d610386538a778b0703dc3be0", 0xb6, 0x8001}, {&(0x7f0000000980)="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", 0x800, 0x1}, {&(0x7f0000000280)="86f370f33773b8", 0x7, 0x1}, {&(0x7f0000000700)="147b532942353fcaaaf35c3a9ac04f4d389c62845a", 0x15, 0x10000}], 0x0, 0x0) 14:21:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 14:21:10 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) syz_mount_image$tmpfs(&(0x7f0000000900)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x8, &(0x7f0000000740)=[{&(0x7f0000000300)="c3f4648db609e2015421be9902eef73ec7f99f7eb0c80246bf83e3cf0a28a43ec7dbd903ed8e5cb7521ff067fea439ee120e07a18fa6647073a05b476c5d2684882c669da5ba3a8eceb4ae795c02dc4726f171a505a00655ecfe6672061efd32bdd7ffe0aa140ac3f99698c5ca733f4b73b2748bb885859f4452eaf705d086679b", 0x81, 0x100000001}, {&(0x7f0000000400)}, {&(0x7f00000004c0)="cfecdea21021005378417f1e7911ff5704318b9bf9dac0bae5f47b1e552ebc7abadd52055f740e7c", 0x28, 0x2}, {&(0x7f00000005c0)="03c938b8157dc5b56b2f72d0a1342202f876450d077dc2c50b34b2b8ce5225c46e0221cf336199e3e803a028a97b58aec01e9ccb76698dcac866ebbf80afb147bf9d0a1f4a30843ea8d7fc4e882c7881e745f2602d83014dc248781b6166d3686a6015ecd90de3eb8a488fb06264d3002d837cca4effc88365c6", 0x7a, 0x1}, {&(0x7f0000000640)="805674f55fb0225caa03a2f757f9751927ef6f924b726a8852d1410061a923ee4ab70878bdf8c2c75a4bf10f7fc8e4e95f24bc56f8591b4ad7712f71f6c773b2b61c0a5403105e9540dd0e1fa0317c3b5f55e09d341f5b8159794b75deed629ee1770ba60bc54feb51a1a5b2fb99e3f5aaf8d2f841ccd089f461f8fdf1922d0ec29c6b5cf0df71b3d5e6378c1ac23b4a8a30d32d11834a010c91f9ebb8c710efdda6d088454b459b409d610386538a778b0703dc3be0", 0xb6, 0x8001}, {&(0x7f0000000980)="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", 0x7fb, 0x1}, {&(0x7f0000000280)}, {&(0x7f0000000700)="147b532942353fcaaaf35c3a9ac04f4d389c62845a", 0x15, 0x10000}], 0x0, 0x0) 14:21:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x16e}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 287.809163][ T26] audit: type=1804 audit(1587306070.487:30): pid=9234 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/62/bus" dev="sda1" ino=15886 res=1 14:21:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, 0x0, 0x0) 14:21:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x188}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:10 executing program 4: perf_event_open(0x0, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) syz_mount_image$tmpfs(&(0x7f0000000900)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x8, &(0x7f0000000740)=[{&(0x7f0000000300)="c3f4648db609e2015421be9902eef73ec7f99f7eb0c80246bf83e3cf0a28a43ec7dbd903ed8e5cb7521ff067fea439ee120e07a18fa6647073a05b476c5d2684882c669da5ba3a8eceb4ae795c02dc4726f171a505a00655ecfe6672061efd32bdd7ffe0aa140ac3f99698c5ca733f4b73b2748bb885859f4452eaf705d086679b", 0x81, 0x100000001}, {&(0x7f0000000400), 0x0, 0x45}, {&(0x7f00000004c0)="cfecdea21021005378417f1e7911ff5704318b9bf9dac0bae5f47b1e552ebc7abadd52055f740e7c", 0x28, 0x2}, {&(0x7f00000005c0)="03c938b8157dc5b56b2f72d0a1342202f876450d077dc2c50b34b2b8ce5225c46e0221cf336199e3e803a028a97b58aec01e9ccb76698dcac866ebbf80afb147bf9d0a1f4a30843ea8d7fc4e882c7881e745f2602d83014dc248781b6166d3686a6015ecd90de3eb8a488fb06264d3002d837cca4effc88365c6", 0x7a, 0x1}, {&(0x7f0000000640)="805674f55fb0225caa03a2f757f9751927ef6f924b726a8852d1410061a923ee4ab70878bdf8c2c75a4bf10f7fc8e4e95f24bc56f8591b4ad7712f71f6c773b2b61c0a5403105e9540dd0e1fa0317c3b5f55e09d341f5b8159794b75deed629ee1770ba60bc54feb51a1a5b2fb99e3f5aaf8d2f841ccd089f461f8fdf1922d0ec29c6b5cf0df71b3d5e6378c1ac23b4a8a30d32d11834a010c91f9ebb8c710efdda6d088454b459b409d610386538a778b0703dc3be0", 0xb6, 0x8001}, {&(0x7f0000000980)="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", 0x800, 0x1}, {&(0x7f0000000280)="86f370f33773b8", 0x7, 0x1}, {&(0x7f0000000700)="147b532942353fcaaaf35c3a9ac04f4d389c62845a", 0x15, 0x10000}], 0x0, 0x0) 14:21:10 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) creat(&(0x7f00000002c0)='./bus\x00', 0x0) lseek(r0, 0x0, 0x4) 14:21:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, 0x0, 0x0) 14:21:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x188}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:11 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) syz_mount_image$tmpfs(&(0x7f0000000900)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x8, &(0x7f0000000740)=[{&(0x7f0000000300)="c3f4648db609e2015421be9902eef73ec7f99f7eb0c80246bf83e3cf0a28a43ec7dbd903ed8e5cb7521ff067fea439ee120e07a18fa6647073a05b476c5d2684882c669da5ba3a8eceb4ae795c02dc4726f171a505a00655ecfe6672061efd32bdd7ffe0aa140ac3f99698c5ca733f4b73b2748bb885859f4452eaf705d086679b", 0x81, 0x100000001}, {&(0x7f0000000400)}, {&(0x7f00000004c0)="cfecdea21021005378417f1e7911ff5704318b9bf9dac0bae5f47b1e552ebc7abadd52055f740e7c", 0x28, 0x2}, {&(0x7f00000005c0)="03c938b8157dc5b56b2f72d0a1342202f876450d077dc2c50b34b2b8ce5225c46e0221cf336199e3e803a028a97b58aec01e9ccb76698dcac866ebbf80afb147bf9d0a1f4a30843ea8d7fc4e882c7881e745f2602d83014dc248781b6166d3686a6015ecd90de3eb8a488fb06264d3002d837cca4effc88365c6", 0x7a, 0x1}, {&(0x7f0000000640)="805674f55fb0225caa03a2f757f9751927ef6f924b726a8852d1410061a923ee4ab70878bdf8c2c75a4bf10f7fc8e4e95f24bc56f8591b4ad7712f71f6c773b2b61c0a5403105e9540dd0e1fa0317c3b5f55e09d341f5b8159794b75deed629ee1770ba60bc54feb51a1a5b2fb99e3f5aaf8d2f841ccd089f461f8fdf1922d0ec29c6b5cf0df71b3d5e6378c1ac23b4a8a30d32d11834a010c91f9ebb8c710efdda6d088454b459b409d610386538a778b0703dc3be0", 0xb6, 0x8001}, {&(0x7f0000000980)="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", 0x7fb, 0x1}, {&(0x7f0000000280)}, {&(0x7f0000000700)="147b532942353fcaaaf35c3a9ac04f4d389c62845a", 0x15, 0x10000}], 0x0, 0x0) 14:21:11 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, 0x0, 0x0) 14:21:11 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) syz_mount_image$tmpfs(&(0x7f0000000900)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x8, &(0x7f0000000740)=[{&(0x7f0000000300)="c3f4648db609e2015421be9902eef73ec7f99f7eb0c80246bf83e3cf0a28a43ec7dbd903ed8e5cb7521ff067fea439ee120e07a18fa6647073a05b476c5d2684882c669da5ba3a8eceb4ae795c02dc4726f171a505a00655ecfe6672061efd32bdd7ffe0aa140ac3f99698c5ca733f4b73b2748bb885859f4452eaf705d086679b", 0x81, 0x100000001}, {&(0x7f0000000400)}, {&(0x7f00000004c0)="cfecdea21021005378417f1e7911ff5704318b9bf9dac0bae5f47b1e552ebc7abadd52055f740e7c", 0x28, 0x2}, {&(0x7f00000005c0)="03c938b8157dc5b56b2f72d0a1342202f876450d077dc2c50b34b2b8ce5225c46e0221cf336199e3e803a028a97b58aec01e9ccb76698dcac866ebbf80afb147bf9d0a1f4a30843ea8d7fc4e882c7881e745f2602d83014dc248781b6166d3686a6015ecd90de3eb8a488fb06264d3002d837cca4effc88365c6", 0x7a, 0x1}, {&(0x7f0000000640)="805674f55fb0225caa03a2f757f9751927ef6f924b726a8852d1410061a923ee4ab70878bdf8c2c75a4bf10f7fc8e4e95f24bc56f8591b4ad7712f71f6c773b2b61c0a5403105e9540dd0e1fa0317c3b5f55e09d341f5b8159794b75deed629ee1770ba60bc54feb51a1a5b2fb99e3f5aaf8d2f841ccd089f461f8fdf1922d0ec29c6b5cf0df71b3d5e6378c1ac23b4a8a30d32d11834a010c91f9ebb8c710efdda6d088454b459b409d610386538a778b0703dc3be0", 0xb6, 0x8001}, {&(0x7f0000000980)="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", 0x7fb, 0x1}, {&(0x7f0000000280)}, {&(0x7f0000000700)="147b532942353fcaaaf35c3a9ac04f4d389c62845a", 0x15, 0x10000}], 0x0, 0x0) 14:21:11 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) syz_mount_image$tmpfs(&(0x7f0000000900)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x8, &(0x7f0000000740)=[{&(0x7f0000000300)="c3f4648db609e2015421be9902eef73ec7f99f7eb0c80246bf83e3cf0a28a43ec7dbd903ed8e5cb7521ff067fea439ee120e07a18fa6647073a05b476c5d2684882c669da5ba3a8eceb4ae795c02dc4726f171a505a00655ecfe6672061efd32bdd7ffe0aa140ac3f99698c5ca733f4b73b2748bb885859f4452eaf705d086679b", 0x81, 0x100000001}, {&(0x7f0000000400)}, {&(0x7f00000004c0)="cfecdea21021005378417f1e7911ff5704318b9bf9dac0bae5f47b1e552ebc7abadd52055f740e7c", 0x28, 0x2}, {&(0x7f00000005c0)="03c938b8157dc5b56b2f72d0a1342202f876450d077dc2c50b34b2b8ce5225c46e0221cf336199e3e803a028a97b58aec01e9ccb76698dcac866ebbf80afb147bf9d0a1f4a30843ea8d7fc4e882c7881e745f2602d83014dc248781b6166d3686a6015ecd90de3eb8a488fb06264d3002d837cca4effc88365c6", 0x7a, 0x1}, {&(0x7f0000000640)="805674f55fb0225caa03a2f757f9751927ef6f924b726a8852d1410061a923ee4ab70878bdf8c2c75a4bf10f7fc8e4e95f24bc56f8591b4ad7712f71f6c773b2b61c0a5403105e9540dd0e1fa0317c3b5f55e09d341f5b8159794b75deed629ee1770ba60bc54feb51a1a5b2fb99e3f5aaf8d2f841ccd089f461f8fdf1922d0ec29c6b5cf0df71b3d5e6378c1ac23b4a8a30d32d11834a010c91f9ebb8c710efdda6d088454b459b409d610386538a778b0703dc3be0", 0xb6, 0x8001}, {&(0x7f0000000980)="83517173304f01455b28105fb51a06579c752372c22ff8c5d4e710b10594ad776a313388de763af0f777567e511a5ee1fa6c4be8441abb6801613deb36acc519ef7b6e2a50c4d236d6c1ea60380ed95dcc8501c5188d4ed639145d3f4e1adff9fd70ac030d7758f542fc0cd37eafbc60368d4da55ea230f556ed80633dc3bcc219994f8c7335aa97f057834102d0889a6739e68f7e0f7e309d45aca2fc317bc0c0e7fd3cc552b3902b6e371c5c97de40dbdf609685b80b1d541cdd3d9f8cbc54c8e926172827fd478b6646665872ff0e5b060898da2adfbbdf4f532c219cf7fb0ba2fbfd56e3d8a2367ecec16df154cc40d49240efd290969255f53288e15d01508cad49f001b0c9699ead73e0016bc7007cfaedc7ea7d528d4e63402aeb940920d52d39f088e564f447b7b1e52896a5edb03e3a05a13c4524aa3024d077dfcce31c3b7f4adefea36ba189e7668f5b85378c46e494de8e9a9dc1816a0fea5699fad6a44bf59cccf7ad3563e66bc69cc63ef0d0da860ec41a3eba176d3a511727c04b7926b3418ebb3ee69de2c711c4ea4596649d8b3cb9105df5d64b4a6ce53f1bbdaedbee2e32dbdaa0e7a3f9f6a694e7b0578f8837bc3be2fcaf387e06bbcd8b92e8d8537e7ad3779f0dedbc6771a5b3eca57c0f8143471ffc95b85d1fe6b2c477105c9ceb8875fcbd5d72cd5218335a61839931763f5afbb0ca449f5b53f2adb8e0394cb5217be834fba82e22c452ac485ea58abdd239bdca96ab64722e798a9ce856dda65b31277386f05aed26df9350a95b4a74d3e6708641a36aac3886839380c68050e7d786c20b33ab24015657ea1f17ba2aaa9eea85b528b7ab3fded6a90076339623eac3ae2137851641f30f1d49677bee62a1debde7687a183d07f77178af50c1febc9294396988983311930c34be416eaa901d7cd1d48e8c2ab465b3c1b4615e738fd148560f5924c9b2c41c82c6693d046cef38e035bed9efa40594b46406e12dff37eed02ee73b66f15bd837467b8474d0c0f7024bb078298a3f027919b2b918339fa23e9888e6ba4debaa078e6b1b1b26baa85f5aa44812d91a589e49ebe4066bc833cd26db7e9c2fd20d4e66f158d27597c6719a35eb768d3bd25f87cd88045da00431ef1e64808a809235c281bd613a807b9fa78c52e932828f4eff3f221609653f47ae95bf78795b16d4709810e7792c7bf49414082552e2043410196bf4143c97f8952a2273405ad196c760b1e8b03927ee4c221a2061c83d573af0605256e8966fcc9110be2bb736ac7e508c062366c2b909e06764162dce8b7f9c40121631a7633863e9116241ab985592f0f8105153b366f9b0bec389696877633534b1a2521e4bfc5a9f2d94d56e3b73cbfb6cb94f5c0a80fe62273dd4ffea880a40b2b75edac95c75636e21a39f04566bca762875ee89046e25d60a9986f5bd9ef6f6c7a24c59504bddfa8a72e72681a81fe967786b4b2d964c27c1bae6a2e46b2b4914a4b32d01a6902a7ae14e6f0810cf245a35bc8e0e0416450290eed1ae0a325df7deee6cfaa585439305287f767e7c12ba2f83e70ae8b126323b4f2025ba8bcfad282323b7d95ad19b41aabecdeba4b1dfd3435d07599cfddc4228746dbce20f24bf17483949fab4b27298a1aec347c3dd2939d978c99741be38fc2cce37648de572f6642ee2bebc014de646aa47defd9ce6d01be3a2c8e80c4122ccecb6dabcbe728a387c3ba4cee1d2d1e365c5d7136f89bb99643a61979f0d84befc72878d01f2b9e4a2b30ff53371924159329a5d2f883269568729c821e2580162c9fb9bbe7f8447adce20e9f28c60f033c10ae62ea7d70a323fefe28e3ed7ee07aea757d838a753869388a700f9006227583ceb4117f063a62b31d02cf3fb002921446ec698ce4574c95201f0091f5aecca30ed06573892b50d7ea09b314f13647de9454587565f66a618843381a24078f82f22951fc2580e2d6796a3fbc87847d24945b511c261c188e31c8f1205aa31cff7628ac466a49b227b7c430072d7c4c5cdad0225d8ce98f143f25793a9953cb6b19108da060b6c5335a1c1355dffb19e5b1a94947cfa3d56e322b9a208837dd46714e3adbeac539c9d6d0b380cc144b81cbfa9de554caa226519cd4b8bd54b0396ee50bafc994b06ca3dc4bff02f816c48cb0592c0965367ea6b74ba38ebf15bda4cee71e57ef86c91a9525a04c4266773ac394df3d464d26d84b8fc794ab9031b61a734422751e9bbc57cffe4886c670bf3491ce14dd9099a5274ccf8516bf3976de4b421d3b49a9f5c9b76ffdcf9e2c0f88f52b088dd930808128358d0bc846651beb1d284f6b2cdd93e1a2387aca44243c7494cc4fe9f57e178f26ad18917f6a37a72a0d166d7cee6ad7ee3b3b4642cef417931614a20660f826b80e85640d787dd860ce2b74a18752ea7b4cf4fc8865eb92bfdbee4c725d0e26bf42aeb554f3beed8f28353da53c065e21676405fe48bd3fbf6f8f64d5050dfa4dabb848c7bf9e8e3b8ce1641632452ca785a0daf907b60461f2a7c09c2cc8aaa059b766069e4b2d5aea4391b50f6ac968624a1cc1799bf79aa61ba9c3a737c233d6a89fd7ae336f4e7570ec6690c913dbb76bd41911c546018e4db61dfef370f413ebb06c53b7c7c8537d403d2bc35cccd5b1a678f56ec69fccfa1d48392e9fb66329e03c9ef9f675de3c8cc759647ea71607f63db3e89650559187e5aced33f7c4be0e98f835bb7adf3f02f6f84d573f294f2cd86bc3b49b7159bb8d9beefccd8d07ee5513346790be66ec8c00241d17fe46540861d0e34e57288cfce4cf6d0e72dc77eeb1b7e7c840bec4b5dc8ccabe43bfc359a054cb039b30c36f6e3d26b8c484537c26f4f3a9f", 0x7fb, 0x1}, {&(0x7f0000000280)}, {&(0x7f0000000700)="147b532942353fcaaaf35c3a9ac04f4d389c62845a", 0x15, 0x10000}], 0x0, 0x0) 14:21:12 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) creat(&(0x7f00000002c0)='./bus\x00', 0x0) lseek(r0, 0x0, 0x4) 14:21:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:21:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x188}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:21:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230"], 0x195}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000014, &(0x7f000031e000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:21:12 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) syz_mount_image$tmpfs(&(0x7f0000000900)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x8, &(0x7f0000000740)=[{&(0x7f0000000300)="c3f4648db609e2015421be9902eef73ec7f99f7eb0c80246bf83e3cf0a28a43ec7dbd903ed8e5cb7521ff067fea439ee120e07a18fa6647073a05b476c5d2684882c669da5ba3a8eceb4ae795c02dc4726f171a505a00655ecfe6672061efd32bdd7ffe0aa140ac3f99698c5ca733f4b73b2748bb885859f4452eaf705d086679b", 0x81, 0x100000001}, {&(0x7f0000000400)}, {&(0x7f00000004c0)="cfecdea21021005378417f1e7911ff5704318b9bf9dac0bae5f47b1e552ebc7abadd52055f740e7c", 0x28, 0x2}, {&(0x7f00000005c0)="03c938b8157dc5b56b2f72d0a1342202f876450d077dc2c50b34b2b8ce5225c46e0221cf336199e3e803a028a97b58aec01e9ccb76698dcac866ebbf80afb147bf9d0a1f4a30843ea8d7fc4e882c7881e745f2602d83014dc248781b6166d3686a6015ecd90de3eb8a488fb06264d3002d837cca4effc88365c6", 0x7a, 0x1}, {&(0x7f0000000640)="805674f55fb0225caa03a2f757f9751927ef6f924b726a8852d1410061a923ee4ab70878bdf8c2c75a4bf10f7fc8e4e95f24bc56f8591b4ad7712f71f6c773b2b61c0a5403105e9540dd0e1fa0317c3b5f55e09d341f5b8159794b75deed629ee1770ba60bc54feb51a1a5b2fb99e3f5aaf8d2f841ccd089f461f8fdf1922d0ec29c6b5cf0df71b3d5e6378c1ac23b4a8a30d32d11834a010c91f9ebb8c710efdda6d088454b459b409d610386538a778b0703dc3be0", 0xb6, 0x8001}, {&(0x7f0000000980)="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", 0x7fb, 0x1}, {&(0x7f0000000280)}, {&(0x7f0000000700)="147b532942353fcaaaf35c3a9ac04f4d389c62845a", 0x15, 0x10000}], 0x0, 0x0) 14:21:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x195}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:13 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:13 executing program 0: perf_event_open(0x0, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) syz_mount_image$tmpfs(&(0x7f0000000900)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x8, &(0x7f0000000740)=[{&(0x7f0000000300)="c3f4648db609e2015421be9902eef73ec7f99f7eb0c80246bf83e3cf0a28a43ec7dbd903ed8e5cb7521ff067fea439ee120e07a18fa6647073a05b476c5d2684882c669da5ba3a8eceb4ae795c02dc4726f171a505a00655ecfe6672061efd32bdd7ffe0aa140ac3f99698c5ca733f4b73b2748bb885859f4452eaf705d086679b", 0x81, 0x100000001}, {&(0x7f0000000400), 0x0, 0x45}, {&(0x7f00000004c0)="cfecdea21021005378417f1e7911ff5704318b9bf9dac0bae5f47b1e552ebc7abadd52055f740e7c", 0x28, 0x2}, {&(0x7f00000005c0)="03c938b8157dc5b56b2f72d0a1342202f876450d077dc2c50b34b2b8ce5225c46e0221cf336199e3e803a028a97b58aec01e9ccb76698dcac866ebbf80afb147bf9d0a1f4a30843ea8d7fc4e882c7881e745f2602d83014dc248781b6166d3686a6015ecd90de3eb8a488fb06264d3002d837cca4effc88365c6", 0x7a, 0x1}, {&(0x7f0000000640)="805674f55fb0225caa03a2f757f9751927ef6f924b726a8852d1410061a923ee4ab70878bdf8c2c75a4bf10f7fc8e4e95f24bc56f8591b4ad7712f71f6c773b2b61c0a5403105e9540dd0e1fa0317c3b5f55e09d341f5b8159794b75deed629ee1770ba60bc54feb51a1a5b2fb99e3f5aaf8d2f841ccd089f461f8fdf1922d0ec29c6b5cf0df71b3d5e6378c1ac23b4a8a30d32d11834a010c91f9ebb8c710efdda6d088454b459b409d610386538a778b0703dc3be0", 0xb6, 0x8001}, {&(0x7f0000000980)="83517173304f01455b28105fb51a06579c752372c22ff8c5d4e710b10594ad776a313388de763af0f777567e511a5ee1fa6c4be8441abb6801613deb36acc519ef7b6e2a50c4d236d6c1ea60380ed95dcc8501c5188d4ed639145d3f4e1adff9fd70ac030d7758f542fc0cd37eafbc60368d4da55ea230f556ed80633dc3bcc219994f8c7335aa97f057834102d0889a6739e68f7e0f7e309d45aca2fc317bc0c0e7fd3cc552b3902b6e371c5c97de40dbdf609685b80b1d541cdd3d9f8cbc54c8e926172827fd478b6646665872ff0e5b060898da2adfbbdf4f532c219cf7fb0ba2fbfd56e3d8a2367ecec16df154cc40d49240efd290969255f53288e15d01508cad49f001b0c9699ead73e0016bc7007cfaedc7ea7d528d4e63402aeb940920d52d39f088e564f447b7b1e52896a5edb03e3a05a13c4524aa3024d077dfcce31c3b7f4adefea36ba189e7668f5b85378c46e494de8e9a9dc1816a0fea5699fad6a44bf59cccf7ad3563e66bc69cc63ef0d0da860ec41a3eba176d3a511727c04b7926b3418ebb3ee69de2c711c4ea4596649d8b3cb9105df5d64b4a6ce53f1bbdaedbee2e32dbdaa0e7a3f9f6a694e7b0578f8837bc3be2fcaf387e06bbcd8b92e8d8537e7ad3779f0dedbc6771a5b3eca57c0f8143471ffc95b85d1fe6b2c477105c9ceb8875fcbd5d72cd5218335a61839931763f5afbb0ca449f5b53f2adb8e0394cb5217be834fba82e22c452ac485ea58abdd239bdca96ab64722e798a9ce856dda65b31277386f05aed26df9350a95b4a74d3e6708641a36aac3886839380c68050e7d786c20b33ab24015657ea1f17ba2aaa9eea85b528b7ab3fded6a90076339623eac3ae2137851641f30f1d49677bee62a1debde7687a183d07f77178af50c1febc9294396988983311930c34be416eaa901d7cd1d48e8c2ab465b3c1b4615e738fd148560f5924c9b2c41c82c6693d046cef38e035bed9efa40594b46406e12dff37eed02ee73b66f15bd837467b8474d0c0f7024bb078298a3f027919b2b918339fa23e9888e6ba4debaa078e6b1b1b26baa85f5aa44812d91a589e49ebe4066bc833cd26db7e9c2fd20d4e66f158d27597c6719a35eb768d3bd25f87cd88045da00431ef1e64808a809235c281bd613a807b9fa78c52e932828f4eff3f221609653f47ae95bf78795b16d4709810e7792c7bf49414082552e2043410196bf4143c97f8952a2273405ad196c760b1e8b03927ee4c221a2061c83d573af0605256e8966fcc9110be2bb736ac7e508c062366c2b909e06764162dce8b7f9c40121631a7633863e9116241ab985592f0f8105153b366f9b0bec389696877633534b1a2521e4bfc5a9f2d94d56e3b73cbfb6cb94f5c0a80fe62273dd4ffea880a40b2b75edac95c75636e21a39f04566bca762875ee89046e25d60a9986f5bd9ef6f6c7a24c59504bddfa8a72e72681a81fe967786b4b2d964c27c1bae6a2e46b2b4914a4b32d01a6902a7ae14e6f0810cf245a35bc8e0e0416450290eed1ae0a325df7deee6cfaa585439305287f767e7c12ba2f83e70ae8b126323b4f2025ba8bcfad282323b7d95ad19b41aabecdeba4b1dfd3435d07599cfddc4228746dbce20f24bf17483949fab4b27298a1aec347c3dd2939d978c99741be38fc2cce37648de572f6642ee2bebc014de646aa47defd9ce6d01be3a2c8e80c4122ccecb6dabcbe728a387c3ba4cee1d2d1e365c5d7136f89bb99643a61979f0d84befc72878d01f2b9e4a2b30ff53371924159329a5d2f883269568729c821e2580162c9fb9bbe7f8447adce20e9f28c60f033c10ae62ea7d70a323fefe28e3ed7ee07aea757d838a753869388a700f9006227583ceb4117f063a62b31d02cf3fb002921446ec698ce4574c95201f0091f5aecca30ed06573892b50d7ea09b314f13647de9454587565f66a618843381a24078f82f22951fc2580e2d6796a3fbc87847d24945b511c261c188e31c8f1205aa31cff7628ac466a49b227b7c430072d7c4c5cdad0225d8ce98f143f25793a9953cb6b19108da060b6c5335a1c1355dffb19e5b1a94947cfa3d56e322b9a208837dd46714e3adbeac539c9d6d0b380cc144b81cbfa9de554caa226519cd4b8bd54b0396ee50bafc994b06ca3dc4bff02f816c48cb0592c0965367ea6b74ba38ebf15bda4cee71e57ef86c91a9525a04c4266773ac394df3d464d26d84b8fc794ab9031b61a734422751e9bbc57cffe4886c670bf3491ce14dd9099a5274ccf8516bf3976de4b421d3b49a9f5c9b76ffdcf9e2c0f88f52b088dd930808128358d0bc846651beb1d284f6b2cdd93e1a2387aca44243c7494cc4fe9f57e178f26ad18917f6a37a72a0d166d7cee6ad7ee3b3b4642cef417931614a20660f826b80e85640d787dd860ce2b74a18752ea7b4cf4fc8865eb92bfdbee4c725d0e26bf42aeb554f3beed8f28353da53c065e21676405fe48bd3fbf6f8f64d5050dfa4dabb848c7bf9e8e3b8ce1641632452ca785a0daf907b60461f2a7c09c2cc8aaa059b766069e4b2d5aea4391b50f6ac968624a1cc1799bf79aa61ba9c3a737c233d6a89fd7ae336f4e7570ec6690c913dbb76bd41911c546018e4db61dfef370f413ebb06c53b7c7c8537d403d2bc35cccd5b1a678f56ec69fccfa1d48392e9fb66329e03c9ef9f675de3c8cc759647ea71607f63db3e89650559187e5aced33f7c4be0e98f835bb7adf3f02f6f84d573f294f2cd86bc3b49b7159bb8d9beefccd8d07ee5513346790be66ec8c00241d17fe46540861d0e34e57288cfce4cf6d0e72dc77eeb1b7e7c840bec4b5dc8ccabe43bfc359a054cb039b30c36f6e3d26b8c484537c26f4f3a9f911b72ca93", 0x800, 0x1}, {&(0x7f0000000280)="86f370f33773b8", 0x7, 0x1}, {&(0x7f0000000700)="147b532942353fcaaaf35c3a9ac04f4d389c62845a", 0x15, 0x10000}], 0x0, 0x0) 14:21:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x195}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:13 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc008ae67, &(0x7f00000003c0)={0x0, 0x0, @ioapic}) 14:21:13 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:13 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000,privport,version=9']) inotify_init1(0x0) 14:21:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x19c}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:13 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x10) [ 290.807716][ T9362] 9pnet: Unknown protocol version 9 14:21:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x19c}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 290.835590][ T9362] 9pnet: Unknown protocol version 9 14:21:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000840)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='illinois\x00', 0x9) shutdown(r0, 0x1) 14:21:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newtaction={0x14, 0x2e, 0x871a15abc695fa3d}, 0x14}}, 0x0) 14:21:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x19c}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:14 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x7e, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000840)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='illinois\x00', 0x9) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x0) 14:21:14 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) 14:21:14 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc008ae67, &(0x7f00000003c0)={0x0, 0x0, @ioapic}) 14:21:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x19f}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newtaction={0x34, 0x1d, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x20, 0x1, [@m_tunnel_key={0x1c, 0x0, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x4}, {0x4}}}]}]}, 0x34}}, 0x0) 14:21:14 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 14:21:14 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) lseek(r0, 0x0, 0x4) 14:21:14 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) lseek(r0, 0x0, 0x4) [ 291.865011][ T9413] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.0'. [ 291.880896][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 291.880912][ T26] audit: type=1804 audit(1587306074.567:39): pid=9414 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/66/bus" dev="sda1" ino=15955 res=1 14:21:14 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x0, 0x6, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0x3a, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3f}, {0xa, 0x4e24, 0x0, @mcast2, 0x3ff}, 0x7, [0x9, 0x2, 0x1, 0x1, 0x4d0b, 0x800, 0x8, 0x8ab4]}, 0x5c) 14:21:14 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x20, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fbac141410e949", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000d00), &(0x7f0000000580)=""/76, &(0x7f0000000600)="b28e71c7aae7a4d8eba86ca2b08bb5bc2ed1a97f76b967d0c4644e5575a55c1802596681fe85efa183d02f6e4f588b98b5272838df0a21b2c38bc924426cec0f", &(0x7f00000003c0)="a39922259b95901e52b3e732a933a0e876218914c1ad51be6918405735558d49a62e975dd1fad623fb4f0f14eda1b640a53a36b6b180ca0f8f1ef3314d57a018c70966af7e782903cebfc967ff5d3dc3c0a51b308679162d08e8473e4c875eeab98d73f3b6af580e374917bbdd5e4b41adc058d02519df5d60b1c5bc99342dd56926a8d26070d3df6470628333d7c98eae7e2c5f58eef94ce71127c4ed76041fd249d11b19", 0x0, r2}, 0x38) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xa, 0xb, 0xa, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x4, 0x1}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xc, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="1800008f0007000000ff", @ANYRES32=r2, @ANYBLOB="00000000000000009595f8fff0ffffff50730c000800000085100000010001009500000000000000"], &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xc, r2, 0x8, &(0x7f0000000680)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x1, 0x7, 0x9, 0x3}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) openat$cgroup_ro(r3, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000300)=r2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9b5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x9, 0x29, 0x4, 0x5, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x10000}, 0x0, 0x0, 0x1, 0x4, 0xe00000000000, 0x101, 0x4e47}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) [ 291.919324][ T9417] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.0'. 14:21:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x19f}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 292.057877][ T26] audit: type=1804 audit(1587306074.567:40): pid=9414 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/66/bus" dev="sda1" ino=15955 res=1 [ 292.121505][ T9426] IPVS: ftp: loaded support on port[0] = 21 [ 292.166916][ T9426] IPVS: ftp: loaded support on port[0] = 21 [ 292.196618][ T26] audit: type=1804 audit(1587306074.677:41): pid=9419 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/67/bus" dev="sda1" ino=15955 res=1 14:21:15 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:15 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) lseek(r0, 0x0, 0x4) 14:21:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x19f}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 292.268851][ T26] audit: type=1804 audit(1587306074.677:42): pid=9419 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/67/bus" dev="sda1" ino=15955 res=1 [ 292.410639][ T26] audit: type=1804 audit(1587306075.087:43): pid=9478 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/68/bus" dev="sda1" ino=15958 res=1 [ 292.496942][ T26] audit: type=1804 audit(1587306075.127:44): pid=9478 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/68/bus" dev="sda1" ino=15958 res=1 14:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fbac141410e949", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000d00), &(0x7f0000000580)=""/76, &(0x7f0000000600)="b28e71c7aae7a4d8eba86ca2b08bb5bc2ed1a97f76b967d0c4644e5575a55c1802596681fe85efa183d02f6e4f588b98b5272838df0a21b2c38bc924426cec0f", &(0x7f00000003c0)="a39922259b95901e52b3e732a933a0e876218914c1ad51be6918405735558d49a62e975dd1fad623fb4f0f14eda1b640a53a36b6b180ca0f8f1ef3314d57a018c70966af7e782903cebfc967ff5d3dc3c0a51b308679162d08e8473e4c875eeab98d73f3b6af580e374917bbdd5e4b41adc058d02519df5d60b1c5bc99342dd56926a8d26070d3df6470628333d7c98eae7e2c5f58eef94ce71127c4ed76041fd249d11b19", 0x0, r1}, 0x38) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xa, 0xb, 0xa, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xe, r1, 0x8, &(0x7f00000002c0)={0x4, 0x1}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xc, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1800008f0007000000ff", @ANYRES32=r1, @ANYBLOB="00000000000000009595f8fff0ffffff50730c0008000000851000000100"], &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xc, r1, 0x8, &(0x7f0000000680)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x1, 0x7, 0x9, 0x3}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)=r1) 14:21:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x0, 0x6, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0x3a, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3f}, {0xa, 0x4e24, 0x0, @mcast2, 0x3ff}, 0x7, [0x9, 0x2, 0x1, 0x1, 0x4d0b, 0x800, 0x8, 0x8ab4]}, 0x5c) 14:21:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:15 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1a1}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 292.540574][ T2706] tipc: TX() has been purged, node left! [ 292.648487][ T26] audit: type=1804 audit(1587306075.327:45): pid=9489 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/69/bus" dev="sda1" ino=15966 res=1 14:21:15 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) [ 292.695428][ T9491] IPVS: ftp: loaded support on port[0] = 21 14:21:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1a1}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 292.878933][ T26] audit: type=1804 audit(1587306075.557:46): pid=9516 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/70/bus" dev="sda1" ino=15966 res=1 14:21:15 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) [ 293.170763][ T26] audit: type=1804 audit(1587306075.857:47): pid=9527 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/71/bus" dev="sda1" ino=15959 res=1 14:21:16 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:16 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1a1}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000000000000095000000000000001c26d2bff0fa454225b2efe59bb842889c95ef1ba79618689974e65251a831de1911e7ce9427b8fe7c4b194b4a958f49a32d87a43133851864cf48cbb64f52c8197a991a5ad5b2b132abe5a4ff9e3d04d6bd832c0cd77ee508b4f79ce77748c4d0f7074eb8fc284872b4dcc8c365d99548b4fc3d8640f90c0c6b060f2a67d98f03848c8e3868229bba8647ca373da549ae6c972806fc7de1d287ed25f137d95275fbd100dd1046e9b0febe762635bd20f62a827bc127fd8969a01c5a6deca9cedd561e7d955df8a6cda5047fbead7ee7e76d4b870024b85bfc7f64b4d1a13e79c4fb0b7773bc90cb99eded466d80b384ee396f80910953a83327277c3727ab0f1373f4effda7e880eb5e807e180dd7b2b87ffd5f455dd7ec613366c646f31b60e7197f04403a0382ad7b10ec0750914550713acbf4227d0ac1bc4b4cc097a2a902d050f439ac617e25d0937ed80abb39ee2fa21394026993e4d3ff80ad728c4ffb3058d86b1812066256dd17f462e4c791a0c8dace2c82d5df4e6dd8bfc9768d01b22b53322df86ffe495dd7c1958870dda697a2d6a69f291c52e0df19c4d449415e3751002c1119136df42b45b36106a460a94aded5d9c5fcc0429ebbcb0aa494626e617365d406904a9c56c3f10b47017f7b1f39277a61f397bae3eaef7be500789c99fec84533d2908cc5b804fc3df6f59e71f948dab43a9d34fb8b57f7abd2e4055583e705db21d43389528343a87869d601857e669a53412027c944e2277c628921040f3962c43b7ebd4693d7f361039c934833585bb7ee70f6dfaa5dff1a48dc4148b150f01ff9754f73332f1ef1fb979763d0f0e820536f020071cc5ce39b1664a72e7151fbed54720a073957438c6139f706e2d38e40d810c86caa73e51986d775fda0606621c93b89a9c806"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fbac141410e949", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000d00), &(0x7f0000000580)=""/76, &(0x7f0000000600)="b28e71c7aae7a4d8eba86ca2b08bb5bc2ed1a97f76b967d0c4644e5575a55c1802596681fe85efa183d02f6e4f588b98b5272838df0a21b2c38bc924426cec0f", &(0x7f00000003c0)="a39922259b95901e52b3e732a933a0e876218914c1ad51be6918405735558d49a62e975dd1fad623fb4f0f14eda1b640a53a36b6b180ca0f8f1ef3314d57a018c70966af7e782903cebfc967ff5d3dc3c0a51b308679162d08e8473e4c875eeab98d73f3b6af580e374917bbdd5e4b41adc058d02519df5d60b1c5bc99342dd56926a8d26070d3df6470628333d7c98eae7e2c5f58eef94ce71127c4ed76041fd249d11b19", 0x0, r1}, 0x38) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xa, 0xb, 0xa, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xe, r1, 0x8, &(0x7f00000002c0)={0x4, 0x1}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xc, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="1800008f0007000000ff", @ANYRES32=r1, @ANYBLOB="00000000000000009595f8fff0ffffff50730c000800000085100000010001009500000000000000"], &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xc, r1, 0x8, &(0x7f0000000680)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x1, 0x7, 0x9, 0x3}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x9, 0x29, 0x4, 0x5, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x10000}, 0x0, 0x0, 0x1, 0x4, 0xe00000000000, 0x101, 0x4e47}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) 14:21:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fbac141410e949", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000d00), &(0x7f0000000580)=""/76, &(0x7f0000000600)="b28e71c7aae7a4d8eba86ca2b08bb5bc2ed1a97f76b967d0c4644e5575a55c1802596681fe85efa183d02f6e4f588b98b5272838df0a21b2c38bc924426cec0f", &(0x7f00000003c0)="a39922259b95901e52b3e732a933a0e876218914c1ad51be6918405735558d49a62e975dd1fad623fb4f0f14eda1b640a53a36b6b180ca0f8f1ef3314d57a018c70966af7e782903cebfc967ff5d3dc3c0a51b308679162d08e8473e4c875eeab98d73f3b6af580e374917bbdd5e4b41adc058d02519df5d60b1c5bc99342dd56926a8d26070d3df6470628333d7c98eae7e2c5f58eef94ce71127c4ed76041fd249d11b19", 0x0, r1}, 0x38) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xa, 0xb, 0xa, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xe, r1, 0x8, &(0x7f00000002c0)={0x4, 0x1}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xc, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1800008f0007000000ff", @ANYRES32=r1, @ANYBLOB="00000000000000009595f8fff0ffffff50730c0008000000851000000100"], &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xc, r1, 0x8, &(0x7f0000000680)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x1, 0x7, 0x9, 0x3}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)=r1) 14:21:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040), 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:16 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(0xffffffffffffffff, 0x0, 0x4) 14:21:16 executing program 3: socket$key(0xf, 0x3, 0x2) r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040), 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fbac141410e949", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000d00), &(0x7f0000000580)=""/76, &(0x7f0000000600)="b28e71c7aae7a4d8eba86ca2b08bb5bc2ed1a97f76b967d0c4644e5575a55c1802596681fe85efa183d02f6e4f588b98b5272838df0a21b2c38bc924426cec0f", &(0x7f00000003c0)="a39922259b95901e52b3e732a933a0e876218914c1ad51be6918405735558d49a62e975dd1fad623fb4f0f14eda1b640a53a36b6b180ca0f8f1ef3314d57a018c70966af7e782903cebfc967ff5d3dc3c0a51b308679162d08e8473e4c875eeab98d73f3b6af580e374917bbdd5e4b41adc058d02519df5d60b1c5bc99342dd56926a8d26070d3df6470628333d7c98eae7e2c5f58eef94ce71127c4ed76041fd249d11b19", 0x0, r1}, 0x38) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xa, 0xb, 0xa, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xe, r1, 0x8, &(0x7f00000002c0)={0x4, 0x1}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xc, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1800008f0007000000ff", @ANYRES32=r1, @ANYBLOB="00000000000000009595f8fff0ffffff50730c0008000000851000000100"], &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xc, r1, 0x8, &(0x7f0000000680)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x1, 0x7, 0x9, 0x3}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)=r1) 14:21:16 executing program 3: socket$key(0xf, 0x3, 0x2) r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02130000020000000000100000000000cec8c2d43e8b33598daaaa141e2f010000000100000088a021d4bc56b69a9ca722efac37f81fe4664b36c65fcb05d0accf4b8a922017ef05665801d5e809d9988d55e9ad310d5c06c30f6954823c266240108fac36819e94d864c80de71251234029dc304448cd1aa1927c9a8361aecb7a8cc5224cbd4617800fe73fe79ce5e3af1b3e5587a1684c0d1bf5b109f8dcebbfdebb84f62db9247197cbac79f6c30fae1b51f521c4caf7cdce74c0905054ef4f84aa57512b79059fe6ee89d8a6f06d6d7ea7707e6e6824703040bca180e2ee7c3cbcff590f406f995836b08655cda708b8143da211a2763e6f5649a9bfc719eb1c84614be6cf7b08b2af9009fe33f32e27792f28c38208f05cb011fb11073dedb69e14b70ff6e5325502277dd74c4a8424f4b2411a2338f4a69566acf31894a012c6e444ebd65d955c0e1167f3d000fdb94a835df46333ba682489f3438035677dd3bb60d928558e059af7d9cc451e101fc3ae680816310172cfe60e574e3e2d09302e40786cb91847b35f2ca87dd8407115c230e0cb945d293248a3e41779da9b"], 0x10}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000000000000095000000000000001c26d2bff0fa454225b2efe59bb842889c95ef1ba79618689974e65251a831de1911e7ce9427b8fe7c4b194b4a958f49a32d87a43133851864cf48cbb64f52c8197a991a5ad5b2b132abe5a4ff9e3d04d6bd832c0cd77ee508b4f79ce77748c4d0f7074eb8fc284872b4dcc8c365d99548b4fc3d8640f90c0c6b060f2a67d98f03848c8e3868229bba8647ca373da549ae6c972806fc7de1d287ed25f137d95275fbd100dd1046e9b0febe762635bd20f62a827bc127fd8969a01c5a6deca9cedd561e7d955df8a6cda5047fbead7ee7e76d4b870024b85bfc7f64b4d1a13e79c4fb0b7773bc90cb99eded466d80b384ee396f80910953a83327277c3727ab0f1373f4effda7e880eb5e807e180dd7b2b87ffd5f455dd7ec613366c646f31b60e7197f04403a0382ad7b10ec0750914550713acbf4227d0ac1bc4b4cc097a2a902d050f439ac617e25d0937ed80abb39ee2fa21394026993e4d3ff80ad728c4ffb3058d86b1812066256dd17f462e4c791a0c8dace2c82d5df4e6dd8bfc9768d01b22b53322df86ffe495dd7c1958870dda697a2d6a69f291c52e0df19c4d449415e3751002c1119136df42b45b36106a460a94aded5d9c5fcc0429ebbcb0aa494626e617365d406904a9c56c3f10b47017f7b1f39277a61f397bae3eaef7be500789c99fec84533d2908cc5b804fc3df6f59e71f948dab43a9d34fb8b57f7abd2e4055583e705db21d43389528343a87869d601857e669a53412027c944e2277c628921040f3962c43b7ebd4693d7f361039c934833585bb7ee70f6dfaa5dff1a48dc4148b150f01ff9754f73332f1ef1fb979763d0f0e820536f020071cc5ce39b1664a72e7151fbed54720a073957438c6139f706e2d38e40d810c86caa73e51986d775fda0606621c93b89a9c806"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fbac141410e949", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000d00), &(0x7f0000000580)=""/76, &(0x7f0000000600)="b28e71c7aae7a4d8eba86ca2b08bb5bc2ed1a97f76b967d0c4644e5575a55c1802596681fe85efa183d02f6e4f588b98b5272838df0a21b2c38bc924426cec0f", &(0x7f00000003c0)="a39922259b95901e52b3e732a933a0e876218914c1ad51be6918405735558d49a62e975dd1fad623fb4f0f14eda1b640a53a36b6b180ca0f8f1ef3314d57a018c70966af7e782903cebfc967ff5d3dc3c0a51b308679162d08e8473e4c875eeab98d73f3b6af580e374917bbdd5e4b41adc058d02519df5d60b1c5bc99342dd56926a8d26070d3df6470628333d7c98eae7e2c5f58eef94ce71127c4ed76041fd249d11b19", 0x0, r1}, 0x38) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xa, 0xb, 0xa, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xe, r1, 0x8, &(0x7f00000002c0)={0x4, 0x1}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xc, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="1800008f0007000000ff", @ANYRES32=r1, @ANYBLOB="00000000000000009595f8fff0ffffff50730c000800000085100000010001009500000000000000"], &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xc, r1, 0x8, &(0x7f0000000680)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x1, 0x7, 0x9, 0x3}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x9, 0x29, 0x4, 0x5, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x10000}, 0x0, 0x0, 0x1, 0x4, 0xe00000000000, 0x101, 0x4e47}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) 14:21:16 executing program 3: socket$key(0xf, 0x3, 0x2) r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000117, 0x0) 14:21:17 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) creat(0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:17 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 14:21:17 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) socket(0x10, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000900)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x8, &(0x7f0000000740)=[{&(0x7f0000000300)="c3f4648db609e2015421be9902eef73ec7f99f7eb0c80246bf83e3cf0a28a43ec7dbd903ed8e5cb7521ff067fea439ee120e07a18fa6647073a05b476c5d2684882c669da5ba3a8eceb4ae795c02dc4726f171a505a00655ecfe6672061efd32bdd7ffe0aa140ac3f99698c5ca733f4b73b2748bb885859f4452eaf705d086679b", 0x81, 0x100000001}, {&(0x7f0000000400), 0x0, 0x45}, {&(0x7f00000004c0)="cfecdea21021005378417f1e7911ff5704318b9bf9dac0bae5f47b1e552ebc7abadd52055f740e7c", 0x28, 0x2}, {&(0x7f00000005c0)="03c938b8157dc5b56b2f72d0a1342202f876450d077dc2c50b34b2b8ce5225c46e0221cf336199e3e803a028a97b58aec01e9ccb76698dcac866ebbf80afb147bf9d0a1f4a30843ea8d7fc4e882c7881e745f2602d83014dc248781b6166d3686a6015ecd90de3eb8a488fb06264d3002d837cca4effc88365c6", 0x7a}, {0x0, 0x0, 0x8001}, {&(0x7f0000000980)="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", 0x800, 0x1}, {&(0x7f0000000280)="86f370f33773b8", 0x7}, {&(0x7f0000000700)="147b532942353fcaaaf35c3a9ac04f4d389c6284", 0x14, 0x10000}], 0x0, 0x0) 14:21:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:17 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(0xffffffffffffffff, 0x0, 0x4) 14:21:17 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 14:21:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x80ffff}) 14:21:17 executing program 5: creat(&(0x7f0000000000)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='overlay\x00', 0x0, &(0x7f0000000380)={[{@redirect_dir={'redirect_dir', 0x3d, './bus'}}]}) 14:21:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:17 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 14:21:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) [ 295.361577][ T9608] overlayfs: bad mount option "redirect_dir=./bus" [ 295.490558][ T2706] tipc: TX() has been purged, node left! [ 295.643548][ T2706] tipc: TX() has been purged, node left! 14:21:18 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newtaction={0x50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_tunnel_key={0x38, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x50}}, 0x0) 14:21:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x145}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:21:18 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(0xffffffffffffffff, 0x0, 0x4) 14:21:19 executing program 3: ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448cb, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x4) 14:21:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x2, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 296.537858][ T26] audit: type=1800 audit(1587306079.217:48): pid=9641 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=15985 res=0 14:21:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newtaction={0x13, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x20, 0x1, [@m_tunnel_key={0x1c, 0x0, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x4}, {0x4}}}]}]}, 0x34}}, 0x0) 14:21:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x2, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 14:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000000000000095000000000000001c26d2bff0fa454225b2efe59bb842889c95ef1ba79618689974e65251a831de1911e7ce9427b8fe7c4b194b4a958f49a32d87a43133851864cf48cbb64f52c8197a991a5ad5b2b132abe5a4ff9e3d04d6bd832c0cd77ee508b4f79ce77748c4d0f7074eb8fc284872b4dcc8c365d99548b4fc3d8640f90c0c6b060f2a67d98f03848c8e3868229bba8647ca373da549ae6c972806fc7de1d287ed25f137d95275fbd100dd1046e9b0febe762635bd20f62a827bc127fd8969a01c5a6deca9cedd561e7d955df8a6cda5047fbead7ee7e76d4b870024b85bfc7f64b4d1a13e79c4fb0b7773bc90cb99eded466d80b384ee396f80910953a83327277c3727ab0f1373f4effda7e880eb5e807e180dd7b2b87ffd5f455dd7ec613366c646f31b60e7197f04403a0382ad7b10ec0750914550713acbf4227d0ac1bc4b4cc097a2a902d050f439ac617e25d0937ed80abb39ee2fa21394026993e4d3ff80ad728c4ffb3058d86b1812066256dd17f462e4c791a0c8dace2c82d5df4e6dd8bfc9768d01b22b53322df86ffe495dd7c1958870dda697a2d6a69f291c52e0df19c4d449415e3751002c1119136df42b45b36106a460a94aded5d9c5fcc0429ebbcb0aa494626e617365d406904a9c56c3f10b47017f7b1f39277a61f397bae3eaef7be500789c99fec84533d2908cc5b804fc3df6f59e71f948dab43a9d34fb8b57f7abd2e4055583e705db21d43389528343a87869d601857e669a53412027c944e2277c628921040f3962c43b7ebd4693d7f361039c934833585bb7ee70f6dfaa5dff1a48dc4148b150f01ff9754f73332f1ef1fb979763d0f0e820536f020071cc5ce39b1664a72e7151fbed54720a073957438c6139f706e2d38e40d810c86caa73e51986d775fda0606621c93b89a9c806"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cea", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xa, 0xb, 0xa}, @func, @call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xe, r1, 0x8, &(0x7f00000002c0)={0x4, 0x1}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) 14:21:20 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x0, 0x1, 0x80000001}, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:21:20 executing program 4: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400007e280000005e00ff03c81f8374b4c125a4ffba16a0aa1c0009b3ebea966cf0554edc7de8ddeb133c2b", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:21:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f05", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="f97a5df209495e78d7594509a7e350d066d997c29c8bd847c3c3711fd28dda8ed55c4b71a0cff82d451e946f649a90aa08b8a43d691d466e0d27939ff5ddbe5c0101000000fe1a72000000ec3a6722d6101cf3354bbdcaea79681469b82118cfe531eb43020000000000000089e81487f56ff3a2c765b757efb82cefec10d4cd83b89ac0631b466f0cb0e4e4d94ad214819dd0e174627b03ed48bac902b3ef155a608780804325728d6754b75a5d8afbabc806000000a2304c8ec97d9778fa91f33e9e0a591ea6b267b9b2ddef8de531ba85b3de45ced148f4ab819a94fc9132fcb6"], 0x0, 0xe2}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0xd) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 14:21:21 executing program 0: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000100)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={0x0}}, 0x4040080) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="2d6885a35f763b546f90c471987100"/29], 0x3}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0xfffffffffffffffc}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1e605, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x60}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x4}) open(0x0, 0x3d5342, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:21:21 executing program 1: r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:21 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000636c77", 0x0, 0x100, 0x6000000000000000}, 0x28) 14:21:21 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x10802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)=ANY=[@ANYBLOB], 0x1}], 0x4}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 14:21:21 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 14:21:22 executing program 4: pipe(&(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6, 0x0, 0x0, 0x10}]}, 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYPTR64], 0x1001) splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) 14:21:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x1002040, 0x0) syz_mount_image$tmpfs(&(0x7f0000000900)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:21:22 executing program 4: r0 = eventfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000001c0)={0x0, 0x0, 0x0, r3}) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r0}) 14:21:22 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000240)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) 14:21:22 executing program 1: r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:23 executing program 5: r0 = memfd_create(&(0x7f0000000180)='\vem1\xc1\xf8\xa6\xc1\a\xae/\x81\x8dN&\ad\x9aJ\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\xe13\xfd\x9f\'\xf2\x99\"\x1e\xa6[\x0e\x97t\xd4\x86\xe4\xa8\xcf\xb8\x86\x8b&\x9d\xcf\xa1\xab\xaf\xf5z\xa7?\rpjv\x05m\xfd\x89MbRz?\ft\xd2!\xe8k\xc4sc\x18b\xb6\xfc\xbe\x8b\x86F\xfdT{M\xd5\x03Y\x90tM\xa1>Q\x97$\x1b\xd7T\xf79\x06+\x06E\"\x19\x90\xba\xaf\x05\x10\x156\xa8\x9a\x99\xbd\x1a\x99\'\xe5l\xc5{7\rca|\x7f`\xb88*\xcf;\n\x98\xd8\'\xf8[\xb3\xa4\x16\\\xfak\x83c#\xa4\xea\x03p\x9c\n\xb7h\xdaN\xb6\xb1\x9f\x87SC\xe4:\xb4(H\x8f\x18/\xbe* \x02\xc9\xe9V\x0fF\x12\x0e\x8b\xb8\xcf\x00\x83\xcb!0\b\xd3d\xb3_\xc2\xf8\f\xa6A`\xdf)\x91(\x9a\xac\x12\xc7\xb7\x11\xa9S\xd2aX\xa4\xed\xa2\x7f\xf2#\x9fH4\xa9\xb9\x90\xe4\xad\x05\x9aaaW\x1d\x94\x85\'O]\x84\x8d\xef\xe4^%\xc7\xd5\x85\x8f\x86\xcb\xa2A2\xd1n\xe6\xb0\xcf\td\x88\x86\xa2\x97h\x85\x96R\xa7tO6\x0f\xc9\x16i\x06\x0f\x1f\x13H3\xc3\xdf\xde\xb2Ua\xde\v\xf8\xc0\xcc\xe1\x14\xea\xd7\x85\xf7\xe8v\xf4\x8b\xc1\xec\xce\x8c\x0f&\xe7g\x92*\x8d\xb2Q\xbez\x93\x860\x8b\x11\x9aR\xee\x06\x1b8\x13\x9ch\x8f\x14I?4X\xaf\xfb\xa4H \x90\x91d\xb5\x8b\x00\x00\x00\x00\x00\x00\x00\xe2\xed\x83\xf5\xe6a\x86G.\xe41', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="34e7ff002000351000007f12b579fbec9961f093751f85a8f50b17eeffff0093750ecbd956dfff01000000000200389c1f42d3a9bdd962f67087f744de2c074877000445a535626e05b645ca18b67561e2fcda4806d40ce1fb6cc6fe46b8"], 0x5e) sendfile(r0, r0, &(0x7f0000001000), 0xffff) 14:21:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000500)='2', 0x1}], 0x1, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x20000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(0x0, 0x0) 14:21:23 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)) fcntl$lock(r1, 0x26, &(0x7f0000000180)={0x40001}) syz_mount_image$nfs4(0x0, &(0x7f0000000240)='./bus\x00', 0xffffffff00000000, 0x0, &(0x7f0000001400), 0x2000, 0x0) creat(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040), 0x8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:21:23 executing program 0: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000100)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={0x0}}, 0x4040080) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="2d6885a35f763b546f90c471987100"/29], 0x3}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0xfffffffffffffffc}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1e605, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x60}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x4}) open(0x0, 0x3d5342, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:21:23 executing program 1: r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) sendmmsg$alg(r4, &(0x7f0000002700)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)="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", 0xae}, {&(0x7f0000000140)="0272f8e661d82e2f7a19243ccd5cef7165de1e59931f71baa88f3f", 0xd9}, {&(0x7f0000000200)}, {&(0x7f0000002900)="c9", 0x1}], 0x4, 0x0, 0x0, 0x24080010}], 0x500, 0x4805) 14:21:23 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x6) 14:21:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)) fcntl$lock(r1, 0x26, &(0x7f0000000180)={0x40001}) syz_mount_image$nfs4(0x0, &(0x7f0000000240)='./bus\x00', 0xffffffff00000000, 0x0, &(0x7f0000001400), 0x2000, 0x0) creat(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040), 0x8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:21:23 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000001c0)=""/54, 0x36) 14:21:23 executing program 4: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000100)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x4, 0x70bd2a, 0x0, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x4040080) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="2d6885a35f763b546f90c471987100"/29], 0x3}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1e605, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x60}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x4}) open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:21:23 executing program 5: r0 = socket$packet(0x11, 0x80000000000003, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x1000000000000a}, 0x1c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x4e26, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') sendfile(r1, r4, 0x0, 0xedc0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000540)=0x95b5, 0x4) recvmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1}, 0x0) 14:21:24 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:24 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:24 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:24 executing program 0: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000100)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={0x0}}, 0x4040080) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="2d6885a35f763b546f90c471987100"/29], 0x3}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0xfffffffffffffffc}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1e605, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x60}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x4}) open(0x0, 0x3d5342, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:21:24 executing program 1: creat(0x0, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r2, 0x29, 0x3e, &(0x7f00002cef88)="d84f7398", 0x4) sendto$inet6(r2, &(0x7f0000000840)="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", 0xffffff4a, 0x20008044, &(0x7f0000000080)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) 14:21:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r2, 0x29, 0x3e, &(0x7f00002cef88)="d84f7398", 0x4) sendto$inet6(r2, &(0x7f0000000840)="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", 0xffffff4a, 0x20008044, &(0x7f0000000080)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) 14:21:24 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup2(0xffffffffffffffff, r2) sendto$inet(0xffffffffffffffff, 0x0, 0x2, 0x4048080, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) 14:21:24 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:24 executing program 4: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000100)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x4, 0x70bd2a, 0x0, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x4040080) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="2d6885a35f763b546f90c471987100"/29], 0x3}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1e605, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x60}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x4}) open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:21:25 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup2(0xffffffffffffffff, r2) sendto$inet(0xffffffffffffffff, 0x0, 0x2, 0x4048080, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) 14:21:25 executing program 1: creat(0x0, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup2(0xffffffffffffffff, r2) sendto$inet(0xffffffffffffffff, 0x0, 0x2, 0x4048080, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) 14:21:25 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be5182", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:27 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:27 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:27 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup2(0xffffffffffffffff, r2) sendto$inet(0xffffffffffffffff, 0x0, 0x2, 0x4048080, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) 14:21:27 executing program 0: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xce024b8b) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000240)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snd/timer\x00', 0x0) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES16=r1, @ANYBLOB="bf502e33ac18366b1aefb651e9f6eccceb7e57da320688bcfec3f4388875c8c6baf6ad8dc44f2f9a8719153bb7c45021d74702ceb1e3fc31b236fcde67870b877f55e00083e41f0000006cf8da9d889d7c51edeedc10e5e79c103f062117d5336d53cf7aabea59a45858", @ANYRES64=0x0, @ANYPTR, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYPTR64, @ANYRESDEC=r2, @ANYBLOB="26a773b11156d1d5cfa349a0378986ad3c62420920e4ae96aa4614e7bd5ca2db76c34bee052305fe9b6dae7cda3abf170c0926a0d77ab9921712912e61e254472e0710362238807b79fc4f838c0c9bec51ce806371ab4767896a92994e8157b5b39b321e0d5a13e28e01b34ef0c5526395de3f33035f6855a28e15acc60cf26993ae6e2df2cba083db76041a34aaf4f2fadaf0c803b65cc60b378be831be5da70eea7b9c704d2847ec7dc27c1a18c56ae2026018ad8bf01bd4c5d4866d28098b86a0e79d34478c23bdf1f94201a7c0e9939167c910b5322aaad55c6809f3c8f40f0a4f39873673eda5baa2c108d4287c867f1dfc49c6ec3f6be37aea", @ANYRESDEC, @ANYRESHEX=r0, @ANYPTR64], @ANYRES16=r3, @ANYRESHEX]], 0x1}, 0x1, 0x0, 0x0, 0x48080}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[]}, 0x1, 0x0, 0x0, 0x4004080}, 0x24058080) chdir(&(0x7f0000000140)='./file0\x00') pipe(0x0) rmdir(&(0x7f0000000100)='./file0\x00') 14:21:27 executing program 4: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000100)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x4, 0x70bd2a, 0x0, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x4040080) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="ff0001049c84c9e10000d09c27f87e9452fc9f1182b0a843b46e46264028d121dbbf10d4bf29d61ee6daf95894c8431e4e3e2a3d8b43ef27c1d2e5d69819c1f2f083d046e505357a49983c31f7e47bbb2841648aa4fdd5cdd775cf1f9676a602df08004ce80e7c22bba8a0af000000000000000000007bdd81782ce67273bb9e64ee118daaf3d5fa7d259aff401da29c4c166923c59905f44d0bc515e72fd940e180e9b31e8e0b9449403b2b0df4fb3618525ce81f852137e783bcf8c7a18cc0ab60ac1c08a7bfbed80dcdb4da5f0754d0ae2e4364d68e337abbaa7b820df40a96145b23a66b77eb3cda2cc00f820d1e20574eb86f3fb5e6a2612c7b65aad1ffe55e0ee65a671045b0ce4e1429972ebe146ff8c46fa4ff220b20d501eaf0b671d216140b8357d724d9e2d9a092a94738dbe18f351a13859944219dda4fae83d5f7e53c38eb0f8088163c21911285f008315933904bde64eff1950f844e747d5282c724e9b04a15bdaf0ebb8a4849e73a4ecad27d161c9f0b7e4b02811867", @ANYRES16=0x0, @ANYBLOB="2d6885a35f763b546f90c471987100"/29], 0x3}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1e605, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x60}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x4}) open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:21:27 executing program 1: creat(0x0, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:27 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup2(0xffffffffffffffff, r2) sendto$inet(0xffffffffffffffff, 0x0, 0x2, 0x4048080, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) 14:21:27 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) fgetxattr(r1, 0x0, &(0x7f0000000180)=""/49, 0x31) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x8200) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000009500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)=ANY=[]}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20000, 0x46) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) getresuid(&(0x7f0000004180), 0x0, 0x0) 14:21:27 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e1", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:27 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(0x0, 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f0000000240)={@void, @val={0x3}, @mpls={[], @ipv4=@icmp={{0x8, 0x4, 0x0, 0x0, 0x224, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @remote={0xac, 0x14, 0x8}}, @timestamp}}}, 0x100c) 14:21:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xffffffffffffffdf}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2ae) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48d947f1e128a02500c57bb79ac313e5a1174c1f5c561412522e6ab7c67f57b0afbacf0b9c7a67cd4bd833", 0x77}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) recvmmsg(r4, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) sendto$inet(0xffffffffffffffff, &(0x7f0000001680)="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", 0x2e8, 0x805, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="f1c7cf94b69a93daf146f7d921d9f15caed8d3159d50722fd2d0cbe7610568ac33cfb1eb6a0a9ae5a6dd6f0cac5992a4e7694ca8dab42973f0b22b1d16c4104ff62a5d28a686060600000000000000280132d79845114cd7ff8592b901007859b8197c8367979f94d29be957d6f9c130a0cecc628632ea1a11a11e6c955b18ec4c6c8f890b23686e7dc349d62a71f9601a24edac5c5dd08ebb473fd8eceea7f7c0849c14b69de8a9facd9f89ff24120f8b43f2884912f91467e1019f45b717899f2f48ad61a9aa5020c01650554210f47b981b7aed89e6c087ed023d4507c82b4eb15b47e168f514", @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x2}, 0x20000000) [ 305.090662][ T9940] ptrace attach of "/root/syz-executor.5"[9938] was attempted by "/root/syz-executor.5"[9940] [ 305.326524][ T9961] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 305.336013][ T9961] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 305.348039][ T9961] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 305.359270][ T9961] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 305.370449][ T9961] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 305.381901][ T9961] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 305.393050][ T9961] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 305.404500][ T9961] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 305.415678][ T9961] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 305.427035][ T9961] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 306.721223][ T0] NOHZ: local_softirq_pending 08 14:21:30 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:30 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:30 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(0x0, 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:30 executing program 5: sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) fgetxattr(r1, 0x0, &(0x7f0000000180)=""/49, 0x31) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x8200) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000009500)={0x0, 0x0, &(0x7f0000009380)=[{&(0x7f0000009140)}], 0x1, &(0x7f00000011c0)=ANY=[@ANYPTR64=&(0x7f0000001280)=ANY=[]], 0x8}, 0x0) r3 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x20000, 0x46) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) socket$inet_udplite(0x2, 0x2, 0x88) getresuid(&(0x7f0000004180), 0x0, 0x0) 14:21:30 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d9352669", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xffffffffffffffdf}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2ae) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48d947f1e128a02500c57bb79ac313e5a1174c1f5c561412522e6ab7c67f57b0afbacf0b9c7a67cd4bd833", 0x77}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) recvmmsg(r4, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) sendto$inet(0xffffffffffffffff, &(0x7f0000001680)="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", 0x2e8, 0x805, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="f1c7cf94b69a93daf146f7d921d9f15caed8d3159d50722fd2d0cbe7610568ac33cfb1eb6a0a9ae5a6dd6f0cac5992a4e7694ca8dab42973f0b22b1d16c4104ff62a5d28a686060600000000000000280132d79845114cd7ff8592b901007859b8197c8367979f94d29be957d6f9c130a0cecc628632ea1a11a11e6c955b18ec4c6c8f890b23686e7dc349d62a71f9601a24edac5c5dd08ebb473fd8eceea7f7c0849c14b69de8a9facd9f89ff24120f8b43f2884912f91467e1019f45b717899f2f48ad61a9aa5020c01650554210f47b981b7aed89e6c087ed023d4507c82b4eb15b47e168f514", @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x2}, 0x20000000) 14:21:30 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d9352669", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 307.595409][ T9991] ptrace attach of "/root/syz-executor.4"[9988] was attempted by "/root/syz-executor.4"[9991] 14:21:30 executing program 5: sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) fgetxattr(r1, 0x0, &(0x7f0000000180)=""/49, 0x31) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x8200) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000009500)={0x0, 0x0, &(0x7f0000009380)=[{&(0x7f0000009140)}], 0x1, &(0x7f00000011c0)=ANY=[@ANYPTR64=&(0x7f0000001280)=ANY=[]], 0x8}, 0x0) r3 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x20000, 0x46) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) socket$inet_udplite(0x2, 0x2, 0x88) getresuid(&(0x7f0000004180), 0x0, 0x0) 14:21:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:21:30 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:31 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(0x0, 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:31 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 14:21:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:21:33 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:21:33 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:33 executing program 0: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xce024b8b) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000240)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snd/timer\x00', 0x0) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES16=r1, @ANYBLOB="bf502e33ac18366b1aefb651e9f6eccceb7e57da320688bcfec3f4388875c8c6baf6ad8dc44f2f9a8719153bb7c45021d74702ceb1e3fc31b236fcde67870b877f55e00083e41f0000006cf8da9d889d7c51edeedc10e5e79c103f062117d5336d53cf7aabea59a45858", @ANYRES64=0x0, @ANYPTR, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYPTR64, @ANYRESDEC=r2, @ANYBLOB="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", @ANYRESDEC, @ANYRESHEX=r0, @ANYPTR64], @ANYRES16=r3, @ANYRESHEX]], 0x1}, 0x1, 0x0, 0x0, 0x48080}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[]}, 0x1, 0x0, 0x0, 0x4004080}, 0x24058080) chdir(&(0x7f0000000140)='./file0\x00') pipe(0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=""/150, 0x96) open$dir(0x0, 0x600040, 0x55) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) rmdir(&(0x7f0000000100)='./file0\x00') open(&(0x7f0000000700)='./file0\x00', 0x4b00, 0x8) 14:21:33 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:33 executing program 4: [ 310.669014][ T26] audit: type=1804 audit(1587306093.347:49): pid=10073 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/84/bus" dev="sda1" ino=16091 res=1 14:21:33 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:33 executing program 0: 14:21:33 executing program 4: [ 310.892345][ T26] audit: type=1804 audit(1587306093.577:50): pid=10083 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/85/bus" dev="sda1" ino=16085 res=1 14:21:33 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:33 executing program 0: 14:21:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) [ 311.091360][ T26] audit: type=1804 audit(1587306093.777:51): pid=10090 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/86/bus" dev="sda1" ino=16083 res=1 14:21:36 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:36 executing program 4: 14:21:36 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:36 executing program 0: 14:21:36 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:21:36 executing program 0: 14:21:36 executing program 4: [ 313.753791][ T26] audit: type=1804 audit(1587306096.437:52): pid=10116 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/87/bus" dev="sda1" ino=16106 res=1 14:21:36 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) [ 313.818918][ T26] audit: type=1804 audit(1587306096.467:53): pid=10116 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/87/bus" dev="sda1" ino=16106 res=1 14:21:36 executing program 4: 14:21:36 executing program 0: [ 313.983564][ T26] audit: type=1804 audit(1587306096.667:54): pid=10128 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/88/bus" dev="sda1" ino=16104 res=1 14:21:36 executing program 4: [ 314.064706][ T26] audit: type=1804 audit(1587306096.667:55): pid=10128 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/88/bus" dev="sda1" ino=16104 res=1 14:21:39 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:39 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x4) 14:21:39 executing program 0: 14:21:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) 14:21:39 executing program 4: 14:21:39 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:39 executing program 0: 14:21:39 executing program 4: [ 316.815898][ T26] audit: type=1804 audit(1587306099.498:56): pid=10155 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/89/bus" dev="sda1" ino=15953 res=1 14:21:39 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, 0x0, 0x0) lseek(r0, 0x0, 0x4) [ 316.895641][ T26] audit: type=1804 audit(1587306099.528:57): pid=10155 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/89/bus" dev="sda1" ino=15953 res=1 14:21:39 executing program 0: 14:21:39 executing program 4: 14:21:39 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, 0x0, 0x0) lseek(r0, 0x0, 0x4) [ 317.019482][ T26] audit: type=1804 audit(1587306099.698:58): pid=10164 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/90/bus" dev="sda1" ino=15744 res=1 [ 317.117664][ T26] audit: type=1804 audit(1587306099.708:59): pid=10164 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/90/bus" dev="sda1" ino=15744 res=1 [ 317.189780][ T26] audit: type=1804 audit(1587306099.868:60): pid=10168 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/91/bus" dev="sda1" ino=15969 res=1 [ 317.243056][ T26] audit: type=1804 audit(1587306099.898:61): pid=10168 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/91/bus" dev="sda1" ino=15969 res=1 14:21:42 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:42 executing program 0: 14:21:42 executing program 4: 14:21:42 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, 0x0, 0x0) lseek(r0, 0x0, 0x4) 14:21:42 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) 14:21:42 executing program 0: [ 319.964637][ T26] audit: type=1804 audit(1587306102.648:62): pid=10190 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/92/bus" dev="sda1" ino=15777 res=1 14:21:42 executing program 4: 14:21:42 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(0xffffffffffffffff, 0x0, 0x4) 14:21:42 executing program 0: [ 320.050578][ T26] audit: type=1804 audit(1587306102.678:63): pid=10190 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/92/bus" dev="sda1" ino=15777 res=1 14:21:42 executing program 4: 14:21:42 executing program 0: [ 320.152953][ T26] audit: type=1804 audit(1587306102.838:64): pid=10200 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/93/bus" dev="sda1" ino=16119 res=1 [ 320.227156][ T26] audit: type=1804 audit(1587306102.838:65): pid=10200 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/93/bus" dev="sda1" ino=16119 res=1 14:21:45 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:45 executing program 4: 14:21:45 executing program 0: 14:21:45 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:45 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(0xffffffffffffffff, 0x0, 0x4) 14:21:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) 14:21:45 executing program 4: [ 323.060781][ T26] audit: type=1804 audit(1587306105.748:66): pid=10228 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/94/bus" dev="sda1" ino=16138 res=1 14:21:45 executing program 0: 14:21:45 executing program 0: [ 323.109159][ T26] audit: type=1804 audit(1587306105.748:67): pid=10228 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/94/bus" dev="sda1" ino=16138 res=1 14:21:45 executing program 4: 14:21:45 executing program 0: 14:21:46 executing program 4: 14:21:48 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:48 executing program 0: 14:21:48 executing program 4: 14:21:48 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:48 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(0xffffffffffffffff, 0x0, 0x4) 14:21:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:21:48 executing program 4: 14:21:48 executing program 0: [ 326.132613][ T26] audit: type=1804 audit(1587306108.818:68): pid=10262 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/95/bus" dev="sda1" ino=16154 res=1 14:21:48 executing program 4: [ 326.227589][ T26] audit: type=1804 audit(1587306108.848:69): pid=10262 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/95/bus" dev="sda1" ino=16154 res=1 14:21:49 executing program 0: 14:21:49 executing program 4: 14:21:49 executing program 0: 14:21:51 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:51 executing program 4: 14:21:51 executing program 0: 14:21:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:51 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x0) 14:21:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) [ 329.193184][ T26] audit: type=1804 audit(1587306111.878:70): pid=10299 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/96/bus" dev="sda1" ino=16168 res=1 14:21:51 executing program 4: 14:21:52 executing program 0: 14:21:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) [ 329.254138][ T26] audit: type=1804 audit(1587306111.908:71): pid=10299 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/96/bus" dev="sda1" ino=16168 res=1 14:21:52 executing program 0: 14:21:52 executing program 4: 14:21:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:54 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:54 executing program 0: 14:21:54 executing program 4: 14:21:54 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:54 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x0) 14:21:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:21:55 executing program 0: 14:21:55 executing program 4: [ 332.332569][ T26] audit: type=1804 audit(1587306115.018:72): pid=10340 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/97/bus" dev="sda1" ino=16194 res=1 14:21:55 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) [ 332.383652][ T26] audit: type=1804 audit(1587306115.038:73): pid=10340 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/97/bus" dev="sda1" ino=16194 res=1 14:21:55 executing program 0: 14:21:55 executing program 4: 14:21:55 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:58 executing program 4: 14:21:58 executing program 0: 14:21:58 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:21:58 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:21:58 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) lseek(r0, 0x0, 0x0) 14:21:58 executing program 4: 14:21:58 executing program 0: 14:21:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:21:58 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) [ 335.452127][ T26] audit: type=1804 audit(1587306118.138:74): pid=10384 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/98/bus" dev="sda1" ino=16213 res=1 [ 335.529004][ T26] audit: type=1804 audit(1587306118.168:75): pid=10384 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/98/bus" dev="sda1" ino=16213 res=1 14:21:58 executing program 0: 14:21:58 executing program 4: 14:21:58 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:21:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:01 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:01 executing program 0: 14:22:01 executing program 4: 14:22:01 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:01 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:01 executing program 1: 14:22:01 executing program 0: 14:22:01 executing program 1: 14:22:01 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:01 executing program 4: 14:22:01 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:01 executing program 0: 14:22:01 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:01 executing program 1: 14:22:01 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:01 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:01 executing program 0: 14:22:01 executing program 4: 14:22:01 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:01 executing program 1: 14:22:01 executing program 0: 14:22:01 executing program 1: 14:22:01 executing program 4: 14:22:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:01 executing program 0: 14:22:02 executing program 1: 14:22:04 executing program 4: 14:22:04 executing program 0: 14:22:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:04 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:04 executing program 1: 14:22:04 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:04 executing program 4: 14:22:04 executing program 1: 14:22:04 executing program 0: 14:22:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:04 executing program 4: 14:22:04 executing program 0: 14:22:04 executing program 1: 14:22:04 executing program 4: 14:22:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:07 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:07 executing program 0: 14:22:07 executing program 1: 14:22:07 executing program 4: 14:22:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:07 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:07 executing program 4: 14:22:07 executing program 1: 14:22:07 executing program 0: 14:22:07 executing program 4: 14:22:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:07 executing program 0: [ 347.670221][ T0] NOHZ: local_softirq_pending 08 14:22:10 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:10 executing program 1: 14:22:10 executing program 4: 14:22:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:10 executing program 0: 14:22:10 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:10 executing program 4: 14:22:10 executing program 1: 14:22:10 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000600)) 14:22:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x2dc) sendfile(r0, r1, 0x0, 0x1c500) 14:22:11 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2b42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x240, 0x0, 0xa) syz_read_part_table(0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000480), 0x0, 0x3}]) 14:22:11 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:22:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000600)) [ 348.426582][ T26] audit: type=1804 audit(1587306131.108:76): pid=10589 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/112/file0/file0" dev="loop1" ino=25 res=1 14:22:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x2) [ 348.527553][T10589] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 348.590486][T10589] FAT-fs (loop1): Filesystem has been set read-only [ 348.626424][T10589] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 348.644790][ T26] audit: type=1800 audit(1587306131.328:77): pid=10589 uid=0 auid=0 ses=5 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file0" dev="loop1" ino=25 res=0 14:22:11 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:11 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:22:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) read$eventfd(r0, &(0x7f0000000000), 0x8) bind$inet(r1, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf0}, 0x14) sendfile(r1, r0, 0x0, 0xedc0) 14:22:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000390400"/20, @ANYRES32=r6, @ANYBLOB="03000000000000002000128008000100736974001400028008000100", @ANYRES32=r5, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 14:22:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2b42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x240, 0x0, 0xa) syz_read_part_table(0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000480), 0x0, 0x3}]) 14:22:11 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:22:11 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) read$eventfd(r0, &(0x7f0000000000), 0x8) bind$inet(r1, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf0}, 0x14) sendfile(r1, r0, 0x0, 0xedc0) [ 349.060394][T10623] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) 14:22:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) sendmmsg$inet(r1, &(0x7f0000000440)=[{{&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_tos_int={{0x14}}], 0xf}}], 0x1, 0x0) 14:22:12 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:12 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:12 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg(r0, &(0x7f0000000800)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}, 0x0) 14:22:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') add_key$user(0x0, &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x2) 14:22:12 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8fffeff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ppoll(&(0x7f0000000080)=[{r0}, {r1, 0x1494}], 0x2, 0x0, 0x0, 0x0) 14:22:12 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db", 0x1) 14:22:12 executing program 3: getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:22:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:12 executing program 3: getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 349.907714][T10836] ptrace attach of "/root/syz-executor.3"[10835] was attempted by "/root/syz-executor.3"[10836] 14:22:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db", 0x1) [ 350.038193][T10844] ptrace attach of "/root/syz-executor.3"[10843] was attempted by "/root/syz-executor.3"[10844] 14:22:13 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:13 executing program 3: getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:22:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8fffeff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fcntl$setlease(r0, 0x400, 0x0) 14:22:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') add_key$user(0x0, &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x2) [ 350.464261][T10865] ptrace attach of "/root/syz-executor.3"[10864] was attempted by "/root/syz-executor.3"[10865] 14:22:13 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000640)='/dev/dri/card#\x00', 0xdd, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0xc01c64ae, &(0x7f0000000080)={0x0, 0x30a9}) 14:22:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:22:13 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_QUANTUM={0x8}]}}]}, 0x38}}, 0x0) 14:22:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') add_key$user(0x0, &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x2) 14:22:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 350.692196][T10880] ptrace attach of "/root/syz-executor.3"[10876] was attempted by "/root/syz-executor.3"[10880] 14:22:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000600)) [ 350.857512][T10893] ptrace attach of "/root/syz-executor.3"[10892] was attempted by "/root/syz-executor.3"[10893] 14:22:13 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:22:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:13 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) 14:22:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000600)) 14:22:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:14 executing program 3: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 351.312246][T10914] ptrace attach of "/root/syz-executor.3"[10912] was attempted by "/root/syz-executor.3"[10914] 14:22:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/233) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:22:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x8090ae81, 0x0) 14:22:14 executing program 3: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 351.469155][T10924] ptrace attach of "/root/syz-executor.3"[10923] was attempted by "/root/syz-executor.3"[10924] 14:22:14 executing program 3: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:22:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{0x0}], 0x0, &(0x7f00000006c0)={[{@errors_continue='errors=continue'}, {@case_sensitive_yes='case_sensitive=yes'}, {@uid={'uid'}}, {@disable_sparse_no='disable_sparse=no'}], [{@dont_measure='dont_measure'}]}) [ 351.713422][T10936] ptrace attach of "/root/syz-executor.3"[10935] was attempted by "/root/syz-executor.3"[10936] [ 351.864561][T10951] ptrace attach of "/root/syz-executor.3"[10950] was attempted by "/root/syz-executor.3"[10951] [ 352.009303][T10953] ntfs: (device loop0): parse_options(): Unrecognized mount option dont_measure. [ 352.018759][T10953] ntfs: (device loop0): parse_options(): Unrecognized mount option . 14:22:14 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:14 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{0x0}], 0x0, &(0x7f00000006c0)={[{@errors_continue='errors=continue'}, {@case_sensitive_yes='case_sensitive=yes'}, {@uid={'uid'}}, {@disable_sparse_no='disable_sparse=no'}], [{@dont_measure='dont_measure'}]}) [ 352.351981][T10967] ntfs: (device loop0): parse_options(): Unrecognized mount option dont_measure. [ 352.361596][T10967] ntfs: (device loop0): parse_options(): Unrecognized mount option . 14:22:15 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:15 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc0405519, &(0x7f0000001000)) 14:22:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 14:22:15 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:15 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000140)={{0x77359400}, {0x0, r2/1000+10000}}, 0x0) 14:22:15 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0x40086602, 0x0) 14:22:15 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:15 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:15 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 14:22:15 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:16 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000080)="de", 0x1}], 0x1) 14:22:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:16 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:16 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r0, &(0x7f0000000180)={0xff, 0x7d, 0x0, {{0x500, 0xe0, 0x0, 0x5000000, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodev{evbox%\x00'/31, 0x1e, 'p\x02\x00}\xfag>\xff\xeb\t\xb55\x1f[\xde1@\x00\x00\x00\x00\x18{\x82\xd9\xb5\x00\x00+Y', 0xb, 'c\xda\fO\xc9t\x85;\x9dP)', 0x65, '\xf8\xf6i\xfbqm\xcf1^\xc2\xf3\x85@\x9a\xc6[\x94\b\x039\xc0\x8c,;\x9e\x1dR\xc3l\xde{\xa4\xa4\x00\xb4\xb0\xb4\xf14\xa6f\xa8RH&\xb2\xb4\xa8\x8e\x01zwW\xb2\x06\xf8\xb0\x9aE\x1b4\a\xdb\xda\xb2\x88K\xaf\x05\x00\x00\x00\x00\x00\x00\x00G\xec!\xca\xbf\xf2\x0f\x9c\x1c\r\xbe6\xf4\xfd\x1aL\xc2\x80\xe8\xd4\x89\xdad\x9a7'}, 0xa, '/dev/nb{#\x00'}}, 0xff) 14:22:16 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:16 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000003440)=[{&(0x7f0000000000)="920159d63078ddb46648b9d8ecc7ee92ee9b802a9d251974e1074c7313cb34350af902a68a379ca909d31e168dda5b6904da228666c5661a736b2957b10c513b5c3249ee7644cee1cef65f9b85530b397b923aa4db480a2c9091435f7990942b5cd46f0c1a0d0c0787a36496b255b5c32e2e1772e74b6f9b232b7bff1fcd26a7ca7ee60125fd0d135b01813c6a43dfd0685f3399440863a2f793e919d522fa70ef82b62cb6361eacdaa5a426650a448583c4283e574c0eb7ca3d3d3b829b1d2ff126ea1bfb58ed4b630618643bfa00ba667f5e1704e3fbb94f243f76758002679d6baf8e74084fa23f443d265740fe09314c66904b41f239eee91a402c6e2c6da9027ca99516171ab483a7727943a8f07e67e38c203b9594b13b4be231a98cdc8777de963c10ec3688be227b9829b4160141bfc4983c408f7a099517e5c441284f4fbb8aa6c00c935cca9bb3fe08a1f67eb24c7bac1bbdf97b5c1b4660a83e048160a6c35b5fe03776ca8149a472f30ccb51d08e6a1dc33ba201c7f925d397496f0de5fd54b50d998ed00ed1ae57ef0dcc069981840377ec0b27ae02fb2b8e14965f4fc205d482ad28fefb9e38d0b9fc5d168464a76310adb7d22d05170eb89be7", 0x1c1, 0x3f}, {&(0x7f0000001040)="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", 0x100, 0x4c}]) 14:22:16 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r0, &(0x7f0000000180)={0xff, 0x7d, 0x0, {{0x500, 0xe0, 0x0, 0x5000000, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodev{evbox%\x00'/31, 0x1e, 'p\x02\x00}\xfag>\xff\xeb\t\xb55\x1f[\xde1@\x00\x00\x00\x00\x18{\x82\xd9\xb5\x00\x00+Y', 0xb, 'c\xda\fO\xc9t\x85;\x9dP)', 0x65, '\xf8\xf6i\xfbqm\xcf1^\xc2\xf3\x85@\x9a\xc6[\x94\b\x039\xc0\x8c,;\x9e\x1dR\xc3l\xde{\xa4\xa4\x00\xb4\xb0\xb4\xf14\xa6f\xa8RH&\xb2\xb4\xa8\x8e\x01zwW\xb2\x06\xf8\xb0\x9aE\x1b4\a\xdb\xda\xb2\x88K\xaf\x05\x00\x00\x00\x00\x00\x00\x00G\xec!\xca\xbf\xf2\x0f\x9c\x1c\r\xbe6\xf4\xfd\x1aL\xc2\x80\xe8\xd4\x89\xdad\x9a7'}, 0xa, '/dev/nb{#\x00'}}, 0xff) 14:22:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100), 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:22:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) [ 353.950384][T11064] loop0: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 [ 353.958367][T11064] loop0: p1 start 819353857 is beyond EOD, truncated [ 353.973420][T11064] loop0: p2 start 1243111190 is beyond EOD, truncated [ 353.988092][T11064] loop0: p3 start 763989610 is beyond EOD, truncated [ 354.036294][T11064] loop0: p4 start 532959400 is beyond EOD, truncated [ 354.070779][T11064] loop0: p5 start 208308567 is beyond EOD, truncated 14:22:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100), 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 354.085290][T11064] loop0: p6 start 3040211789 is beyond EOD, truncated [ 354.119559][T11064] loop0: p7 start 524849351 is beyond EOD, truncated [ 354.172736][T11064] loop0: p8 start 1662580963 is beyond EOD, truncated 14:22:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) [ 354.216872][T11064] loop0: p9 start 3344911711 is beyond EOD, truncated [ 354.238084][T11064] loop0: p10 start 4086762037 is beyond EOD, truncated [ 354.367440][T11064] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 14:22:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:19 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:19 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_rdma(0x10, 0x3, 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x680400, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000000)) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x5}, 0x10) fcntl$setpipe(r2, 0x407, 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8fffeff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x18000000000002e0, 0x69, 0x0, &(0x7f00000004c0)="b95b03b700030000009e40f086dd1fff060000006000002f77fbac141412e0000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x7, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="7b564ce0b770c68a9dc4794de48908e95dd8", &(0x7f0000000080)=""/248, 0x4}, 0x20) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x90000000, 0x4) 14:22:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100), 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:19 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) sendmmsg$inet(r1, &(0x7f0000000440)=[{{&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_tos_int={{0xf}}], 0x18}}], 0x1, 0x0) 14:22:19 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fanotify_init(0x8, 0x0) 14:22:19 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) [ 356.661056][T11129] mmap: syz-executor.0 (11129) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 14:22:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x800}) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x5ca) sendfile(r0, r1, 0x0, 0x1c500) 14:22:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) sched_setattr(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x1c8) sendfile(r0, r1, 0x0, 0x1c500) 14:22:19 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{0x0}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) [ 357.036582][ T26] audit: type=1804 audit(1587306139.718:78): pid=11144 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir878111530/syzkaller.bR5nOR/176/file0/file0" dev="loop0" ino=26 res=1 [ 357.059677][T11141] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 357.070144][T11141] FAT-fs (loop0): Filesystem has been set read-only [ 357.089319][T11141] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) [ 357.129362][T11144] syz-executor.0 (11144) used greatest stack depth: 10232 bytes left 14:22:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x800}) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x5ca) sendfile(r0, r1, 0x0, 0x1c500) [ 357.186045][ T26] audit: type=1804 audit(1587306139.868:79): pid=11148 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/131/file0/file0" dev="loop1" ino=27 res=1 [ 357.249582][T11148] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 357.314853][T11148] FAT-fs (loop1): Filesystem has been set read-only [ 357.386717][ T26] audit: type=1804 audit(1587306140.068:80): pid=11164 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir878111530/syzkaller.bR5nOR/177/file0/file0" dev="loop0" ino=28 res=1 [ 357.448286][T11164] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 357.466301][T11164] FAT-fs (loop0): Filesystem has been set read-only [ 357.474805][T11164] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 14:22:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) sched_setattr(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x1c8) sendfile(r0, r1, 0x0, 0x1c500) 14:22:22 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000000), 0x3) 14:22:22 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x800}) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc19", 0x5ca) sendfile(r0, r1, 0x0, 0x1c500) 14:22:22 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:22:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{0x0}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) [ 359.714605][ T26] audit: type=1804 audit(1587306142.398:81): pid=11186 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir545562203/syzkaller.NIETnb/132/file0/file0" dev="loop1" ino=29 res=1 [ 359.775269][T11186] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 359.798024][T11186] FAT-fs (loop1): Filesystem has been set read-only [ 359.836145][T11201] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 359.842075][ T26] audit: type=1804 audit(1587306142.498:82): pid=11201 uid=0 auid=0 ses=5 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir878111530/syzkaller.bR5nOR/178/file0/file0" dev="loop0" ino=30 res=1 [ 359.867231][T11201] FAT-fs (loop0): Filesystem has been set read-only [ 359.875086][T11201] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 14:22:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x8188aea6, 0x0) 14:22:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:22 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x0, 0x0}) 14:22:22 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup2(r0, r1) 14:22:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 14:22:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x3012}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{0x0}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 14:22:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) [ 361.319475][T11230] ================================================================== [ 361.327617][T11230] BUG: KCSAN: data-race in rq_depth_scale_up / rwb_arm_timer [ 361.334980][T11230] [ 361.337403][T11230] write to 0xffff88812a1118e4 of 4 bytes by interrupt on cpu 0: [ 361.345044][T11230] rq_depth_scale_up+0x5e/0x90 [ 361.349815][T11230] scale_up+0x3f/0x250 [ 361.354062][T11230] wb_timer_fn+0x2d6/0xad0 [ 361.358483][T11230] blk_stat_timer_fn+0x3af/0x3d0 [ 361.363421][T11230] call_timer_fn+0x58/0x2e0 [ 361.368622][T11230] run_timer_softirq+0xb14/0xbd0 [ 361.373575][T11230] __do_softirq+0x118/0x34a [ 361.378087][T11230] irq_exit+0xb5/0xd0 [ 361.382080][T11230] smp_apic_timer_interrupt+0xe2/0x270 [ 361.387548][T11230] apic_timer_interrupt+0xf/0x20 [ 361.392491][T11230] _raw_spin_unlock_irq+0x4b/0x80 [ 361.397524][T11230] shmem_add_to_page_cache+0x534/0x6c0 [ 361.403074][T11230] shmem_getpage_gfp+0x43f/0x1520 [ 361.408116][T11230] shmem_write_begin+0x98/0x130 [ 361.413027][T11230] generic_perform_write+0x13a/0x320 [ 361.418335][T11230] __generic_file_write_iter+0x240/0x370 [ 361.423975][T11230] generic_file_write_iter+0x294/0x38e [ 361.429441][T11230] do_iter_readv_writev+0x4a7/0x5d0 [ 361.435163][T11230] do_iter_write+0x137/0x3a0 [ 361.440531][T11230] vfs_iter_write+0x56/0x80 [ 361.445087][T11230] lo_write_bvec+0xb3/0x1e0 [ 361.449606][T11230] loop_queue_work+0x43b/0x14b9 [ 361.454473][T11230] kthread_worker_fn+0x1d0/0x3c0 [ 361.459598][T11230] loop_kthread_worker_fn+0x49/0x60 [ 361.464807][T11230] kthread+0x203/0x230 [ 361.468892][T11230] ret_from_fork+0x1f/0x30 [ 361.473307][T11230] [ 361.475649][T11230] read to 0xffff88812a1118e4 of 4 bytes by task 11230 on cpu 1: [ 361.483282][T11230] rwb_arm_timer+0x22/0xe0 [ 361.488576][T11230] wbt_wait+0x1a2/0x260 [ 361.492833][T11230] __rq_qos_throttle+0x42/0x70 [ 361.497627][T11230] blk_mq_make_request+0x297/0xf60 [ 361.502756][T11230] generic_make_request+0x196/0x700 [ 361.507964][T11230] submit_bio+0x8f/0x3a0 [ 361.513196][T11230] __mpage_writepage+0xb84/0xdc0 [ 361.518156][T11230] write_cache_pages+0x400/0xa10 [ 361.523259][T11230] mpage_writepages+0xab/0x180 [ 361.528037][T11230] fat_writepages+0x2a/0x40 [ 361.532548][T11230] do_writepages+0x6b/0x170 [ 361.537145][T11230] __filemap_fdatawrite_range+0x1bb/0x220 [ 361.542871][T11230] file_write_and_wait_range+0xfb/0x160 [ 361.548418][T11230] __generic_file_fsync+0x55/0x180 [ 361.553621][T11230] fat_file_fsync+0x54/0x120 [ 361.558224][T11230] vfs_fsync_range+0x7c/0x150 [ 361.562932][T11230] generic_file_write_iter+0x31c/0x38e [ 361.568389][T11230] new_sync_write+0x303/0x400 [ 361.573070][T11230] __vfs_write+0x9e/0xb0 [ 361.577323][T11230] vfs_write+0x189/0x380 [ 361.581602][T11230] ksys_write+0xc5/0x1a0 [ 361.585858][T11230] __x64_sys_write+0x49/0x60 [ 361.590548][T11230] do_syscall_64+0xc7/0x3b0 [ 361.595061][T11230] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 361.600945][T11230] [ 361.603263][T11230] Reported by Kernel Concurrency Sanitizer on: [ 361.609436][T11230] CPU: 1 PID: 11230 Comm: syz-executor.0 Not tainted 5.7.0-rc1-syzkaller #0 [ 361.618108][T11230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.628166][T11230] ================================================================== [ 361.636258][T11230] Kernel panic - not syncing: panic_on_warn set ... [ 361.642861][T11230] CPU: 1 PID: 11230 Comm: syz-executor.0 Not tainted 5.7.0-rc1-syzkaller #0 [ 361.651696][T11230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.661756][T11230] Call Trace: [ 361.665065][T11230] dump_stack+0x11d/0x187 [ 361.669414][T11230] panic+0x210/0x640 [ 361.673326][T11230] ? vprintk_func+0x89/0x13a [ 361.677929][T11230] kcsan_report.cold+0xc/0x1a [ 361.682622][T11230] kcsan_setup_watchpoint+0x3fb/0x440 [ 361.688052][T11230] rwb_arm_timer+0x22/0xe0 [ 361.692490][T11230] wbt_wait+0x1a2/0x260 [ 361.696689][T11230] ? wbt_cleanup+0x70/0x70 [ 361.701120][T11230] __rq_qos_throttle+0x42/0x70 [ 361.705900][T11230] blk_mq_make_request+0x297/0xf60 [ 361.711041][T11230] generic_make_request+0x196/0x700 [ 361.716260][T11230] submit_bio+0x8f/0x3a0 [ 361.720517][T11230] __mpage_writepage+0xb84/0xdc0 [ 361.725481][T11230] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 361.731396][T11230] ? __mod_memcg_state+0x85/0x110 [ 361.736434][T11230] ? __this_cpu_preempt_check+0x3c/0x130 [ 361.742089][T11230] ? __this_cpu_preempt_check+0x3c/0x130 [ 361.747730][T11230] ? __rcu_read_unlock+0x77/0x390 [ 361.752841][T11230] ? percpu_counter_add_batch+0x10f/0x140 [ 361.758580][T11230] write_cache_pages+0x400/0xa10 [ 361.763531][T11230] ? clean_buffers+0x1a0/0x1a0 [ 361.768310][T11230] ? hpet_clkevt_msi_resume+0xaf/0xd0 [ 361.773714][T11230] ? fat_add_cluster+0xd0/0xd0 [ 361.779279][T11230] ? fat_readpages+0x50/0x50 [ 361.783893][T11230] mpage_writepages+0xab/0x180 [ 361.788667][T11230] ? fat_add_cluster+0xd0/0xd0 [ 361.793709][T11230] fat_writepages+0x2a/0x40 [ 361.798215][T11230] do_writepages+0x6b/0x170 [ 361.802724][T11230] ? _raw_spin_unlock+0x38/0x60 [ 361.807583][T11230] ? wbc_attach_and_unlock_inode+0xdd/0x3b0 [ 361.813567][T11230] __filemap_fdatawrite_range+0x1bb/0x220 [ 361.819295][T11230] file_write_and_wait_range+0xfb/0x160 [ 361.824856][T11230] __generic_file_fsync+0x55/0x180 [ 361.829984][T11230] fat_file_fsync+0x54/0x120 [ 361.834568][T11230] ? fat_free_clusters.cold+0x3a/0x3a [ 361.840075][T11230] vfs_fsync_range+0x7c/0x150 [ 361.844743][T11230] generic_file_write_iter+0x31c/0x38e [ 361.850196][T11230] new_sync_write+0x303/0x400 [ 361.854874][T11230] __vfs_write+0x9e/0xb0 [ 361.859101][T11230] vfs_write+0x189/0x380 [ 361.863345][T11230] ksys_write+0xc5/0x1a0 [ 361.867694][T11230] __x64_sys_write+0x49/0x60 [ 361.872279][T11230] do_syscall_64+0xc7/0x3b0 [ 361.877003][T11230] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 361.882913][T11230] RIP: 0033:0x45c829 [ 361.886846][T11230] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.907739][T11230] RSP: 002b:00007f91c7555c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.916662][T11230] RAX: ffffffffffffffda RBX: 000000000050bfc0 RCX: 000000000045c829 [ 361.924618][T11230] RDX: 00000000fffffc41 RSI: 0000000020001440 RDI: 0000000000000003 [ 361.932571][T11230] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 361.940546][T11230] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 361.948594][T11230] R13: 0000000000000cd4 R14: 00000000004cefdf R15: 00007f91c75566d4 [ 361.958528][T11230] Kernel Offset: disabled [ 361.962962][T11230] Rebooting in 86400 seconds..