526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df0000000000000000000000000000000000000000004000"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r5 = syz_open_procfs(r4, &(0x7f0000000280)='map_files\x00') r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/vga_arbiter\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@private}, 0x0, @in6=@empty}}, &(0x7f0000000fc0)=0xe8) ioctl$SNDCTL_DSP_GETODELAY(r5, 0x80045017, &(0x7f00000002c0)) 18:54:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:52 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:52 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_readv(0x0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:52 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r5 = syz_open_procfs(r4, &(0x7f0000000280)='map_files\x00') r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/vga_arbiter\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@private}, 0x0, @in6=@empty}}, &(0x7f0000000fc0)=0xe8) ioctl$SNDCTL_DSP_GETODELAY(r5, 0x80045017, &(0x7f00000002c0)) 18:54:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534", 0xdb}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:54:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) 18:54:53 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_readv(0x0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:53 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:53 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_readv(0x0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) syz_open_procfs(r4, &(0x7f0000000280)='map_files\x00') r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/vga_arbiter\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@private}, 0x0, @in6=@empty}}, &(0x7f0000000fc0)=0xe8) 18:54:54 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) [ 882.393684][T27367] __report_access: 3 callbacks suppressed [ 882.393728][T27367] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27367] 18:54:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534", 0xdb}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 882.455506][T27370] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27370] 18:54:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) io_submit(0x0, 0x0, 0x0) 18:54:54 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) syz_open_procfs(r4, &(0x7f0000000280)='map_files\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/vga_arbiter\x00', 0x2, 0x0) 18:54:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000001400000040000780"], 0x54}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x800, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4040054) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 18:54:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_readv(0x0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) [ 883.178870][T27384] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27384] [ 883.338852][T27384] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27384] 18:54:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000001400000040000780"], 0x54}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x800, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4040054) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 18:54:55 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:54:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) syz_open_procfs(r4, &(0x7f0000000280)='map_files\x00') 18:54:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd8758655340786", 0xdd}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:54:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000001400000040000780"], 0x54}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x800, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4040054) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) [ 883.900256][T27405] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27405] [ 883.974057][T27406] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27406] 18:54:56 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet6(r1, &(0x7f0000000440)={&(0x7f0000000140)={0xa, 0x4e23, 0x7, @ipv4={[], [], @multicast2}, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="f5859973", 0x4}, {&(0x7f0000000240)}], 0x2, &(0x7f0000000340)=[@dontfrag={{0x14, 0x29, 0x3e, 0x80000001}}, @hoplimit_2292={{0x14}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @rthdr={{0x88, 0x29, 0x39, {0x2f, 0xe, 0x1, 0x3, 0x0, [@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @empty}, @remote, @private0, @ipv4={[], [], @empty}, @empty]}}}], 0xd0}, 0x20000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x414581, 0x0) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r8}}, 0xc) r9 = inotify_add_watch(r6, &(0x7f0000000000)='./file0\x00', 0x7300040c) inotify_rm_watch(r2, r9) [ 884.159646][ T32] kauditd_printk_skb: 455 callbacks suppressed [ 884.159702][ T32] audit: type=1326 audit(1595271295.951:25467): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27409 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:54:56 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_readv(0x0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) [ 884.372756][ T32] audit: type=1326 audit(1595271295.991:25468): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27409 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 884.394360][ T32] audit: type=1326 audit(1595271295.991:25469): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27409 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 884.415833][ T32] audit: type=1326 audit(1595271296.011:25470): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27409 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 884.437263][ T32] audit: type=1326 audit(1595271296.011:25471): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27409 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=51 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 884.458789][ T32] audit: type=1326 audit(1595271296.011:25472): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27409 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 884.480222][ T32] audit: type=1326 audit(1595271296.011:25473): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27409 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 884.501662][ T32] audit: type=1326 audit(1595271296.011:25474): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27409 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:54:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) [ 884.523150][ T32] audit: type=1326 audit(1595271296.011:25475): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27409 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 884.544699][ T32] audit: type=1326 audit(1595271296.021:25476): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27409 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:54:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000001400000040000780"], 0x54}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x800, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4040054) [ 884.945825][T27436] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27436] [ 885.009113][T27436] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27436] 18:54:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd8758655340786", 0xdd}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:54:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000001400000040000780"], 0x54}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x800, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4040054) 18:54:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:57 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet6(r1, &(0x7f0000000440)={&(0x7f0000000140)={0xa, 0x4e23, 0x7, @ipv4={[], [], @multicast2}, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="f5859973", 0x4}, {&(0x7f0000000240)}], 0x2, &(0x7f0000000340)=[@dontfrag={{0x14, 0x29, 0x3e, 0x80000001}}, @hoplimit_2292={{0x14}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @rthdr={{0x88, 0x29, 0x39, {0x2f, 0xe, 0x1, 0x3, 0x0, [@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @empty}, @remote, @private0, @ipv4={[], [], @empty}, @empty]}}}], 0xd0}, 0x20000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x414581, 0x0) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r8}}, 0xc) r9 = inotify_add_watch(r6, &(0x7f0000000000)='./file0\x00', 0x7300040c) inotify_rm_watch(r2, r9) 18:54:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) [ 885.894268][T27449] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27449] [ 886.007586][T27449] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27449] 18:54:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000001400000040000780"], 0x54}}, 0x0) 18:54:58 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd8758655340786", 0xdd}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:54:58 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet6(r1, &(0x7f0000000440)={&(0x7f0000000140)={0xa, 0x4e23, 0x7, @ipv4={[], [], @multicast2}, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="f5859973", 0x4}, {&(0x7f0000000240)}], 0x2, &(0x7f0000000340)=[@dontfrag={{0x14, 0x29, 0x3e, 0x80000001}}, @hoplimit_2292={{0x14}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @rthdr={{0x88, 0x29, 0x39, {0x2f, 0xe, 0x1, 0x3, 0x0, [@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @empty}, @remote, @private0, @ipv4={[], [], @empty}, @empty]}}}], 0xd0}, 0x20000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x414581, 0x0) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r8}}, 0xc) r9 = inotify_add_watch(r6, &(0x7f0000000000)='./file0\x00', 0x7300040c) inotify_rm_watch(r2, r9) 18:54:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:54:58 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:54:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)) 18:54:59 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:54:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:54:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet6(r1, &(0x7f0000000440)={&(0x7f0000000140)={0xa, 0x4e23, 0x7, @ipv4={[], [], @multicast2}, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="f5859973", 0x4}, {&(0x7f0000000240)}], 0x2, &(0x7f0000000340)=[@dontfrag={{0x14, 0x29, 0x3e, 0x80000001}}, @hoplimit_2292={{0x14}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @rthdr={{0x88, 0x29, 0x39, {0x2f, 0xe, 0x1, 0x3, 0x0, [@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @empty}, @remote, @private0, @ipv4={[], [], @empty}, @empty]}}}], 0xd0}, 0x20000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x414581, 0x0) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r8}}, 0xc) r9 = inotify_add_watch(r6, &(0x7f0000000000)='./file0\x00', 0x7300040c) inotify_rm_watch(r2, r9) [ 887.467513][T27492] __report_access: 1 callbacks suppressed [ 887.467558][T27492] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27492] [ 887.588399][T27496] ptrace attach of "/root/syz-executor.3"[9974] was attempted by "/root/syz-executor.3"[27496] [ 887.670215][T27502] ptrace attach of "/root/syz-executor.3"[9974] was attempted by "/root/syz-executor.3"[27502] 18:54:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x4}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:54:59 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet6(r1, &(0x7f0000000440)={&(0x7f0000000140)={0xa, 0x4e23, 0x7, @ipv4={[], [], @multicast2}, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="f5859973", 0x4}, {&(0x7f0000000240)}], 0x2, &(0x7f0000000340)=[@dontfrag={{0x14, 0x29, 0x3e, 0x80000001}}, @hoplimit_2292={{0x14}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @rthdr={{0x88, 0x29, 0x39, {0x2f, 0xe, 0x1, 0x3, 0x0, [@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @empty}, @remote, @private0, @ipv4={[], [], @empty}, @empty]}}}], 0xd0}, 0x20000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x414581, 0x0) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r8}}, 0xc) r9 = inotify_add_watch(r6, &(0x7f0000000000)='./file0\x00', 0x7300040c) inotify_rm_watch(r2, r9) 18:54:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c467f3f060302000000000000000200000003000000ce02000038000000d9010000080000000700200002000400000108000000000004000000010100000500000035ffffff0900000008000000080000000600000003000000000001008000000001000000080000005307000001000000db0c00009dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df0000000000000000000000000000000000000000004000"/2649], 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) 18:54:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) socket(0x1, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) [ 888.255929][T27516] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27516] 18:55:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c467f3f060302000000000000000200000003000000ce02000038000000d9010000080000000700200002000400000108000000000004000000010100000500000035ffffff0900000008000000080000000600000003000000000001008000000001000000080000005307000001000000db0c00009dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df0000000000000000000000000000000000000000004000"/2649], 0xa59) 18:55:00 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet6(r1, &(0x7f0000000440)={&(0x7f0000000140)={0xa, 0x4e23, 0x7, @ipv4={[], [], @multicast2}, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="f5859973", 0x4}, {&(0x7f0000000240)}], 0x2, &(0x7f0000000340)=[@dontfrag={{0x14, 0x29, 0x3e, 0x80000001}}, @hoplimit_2292={{0x14}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @rthdr={{0x88, 0x29, 0x39, {0x2f, 0xe, 0x1, 0x3, 0x0, [@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @empty}, @remote, @private0, @ipv4={[], [], @empty}, @empty]}}}], 0xd0}, 0x20000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x414581, 0x0) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r8}}, 0xc) r9 = inotify_add_watch(r6, &(0x7f0000000000)='./file0\x00', 0x7300040c) inotify_rm_watch(r2, r9) 18:55:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x4}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:00 executing program 2: r0 = socket(0x22, 0x1, 0x5) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, r1, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x8010) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getitimer(0x1, &(0x7f0000000200)) [ 889.151236][T27536] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27536] 18:55:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) [ 889.287599][ T32] kauditd_printk_skb: 694 callbacks suppressed [ 889.287653][ T32] audit: type=1326 audit(1595271301.071:26171): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27533 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:01 executing program 1: syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') [ 889.519501][ T32] audit: type=1326 audit(1595271301.121:26172): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27533 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 889.541465][ T32] audit: type=1326 audit(1595271301.121:26173): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27533 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) inotify_init1(0x0) 18:55:01 executing program 3 (fault-call:1 fault-nth:0): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:01 executing program 2 (fault-call:1 fault-nth:0): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 889.945841][ T32] audit: type=1326 audit(1595271301.371:26174): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27542 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 889.967585][ T32] audit: type=1326 audit(1595271301.371:26175): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27542 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 889.989225][ T32] audit: type=1326 audit(1595271301.371:26176): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27552 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 890.010859][ T32] audit: type=1326 audit(1595271301.371:26177): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27552 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 890.032426][ T32] audit: type=1326 audit(1595271301.371:26178): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27552 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 890.053942][ T32] audit: type=1326 audit(1595271301.371:26179): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27544 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 890.075514][ T32] audit: type=1326 audit(1595271301.381:26180): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27544 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket(0x1, 0x803, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:02 executing program 1: syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') [ 890.212616][T27570] FAULT_INJECTION: forcing a failure. [ 890.212616][T27570] name failslab, interval 1, probability 0, space 0, times 0 [ 890.226163][T27570] CPU: 1 PID: 27570 Comm: syz-executor.3 Not tainted 5.8.0-rc5-syzkaller #0 [ 890.234883][T27570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.235395][T27570] Call Trace: [ 890.247132][T27570] dump_stack+0x1df/0x240 [ 890.247132][T27570] should_fail+0x8b7/0x9e0 [ 890.247132][T27570] __should_failslab+0x1f6/0x290 [ 890.247132][T27570] should_failslab+0x29/0x70 [ 890.266894][T27570] kmem_cache_alloc+0xd0/0xd70 [ 890.266894][T27570] ? kmsan_internal_set_origin+0x75/0xb0 [ 890.266894][T27570] ? audit_log_start+0x826/0x1270 [ 890.266894][T27570] ? kmsan_get_metadata+0x11d/0x180 [ 890.266894][T27570] audit_log_start+0x826/0x1270 [ 890.266894][T27570] ? kmsan_get_metadata+0x11d/0x180 [ 890.266894][T27570] audit_seccomp+0xbd/0x3a0 [ 890.266894][T27570] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 890.266894][T27570] __seccomp_filter+0x12ee/0x2720 [ 890.266894][T27570] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 890.317169][T27570] ? kmsan_get_metadata+0x11d/0x180 [ 890.323362][T27570] ? kmsan_get_metadata+0x11d/0x180 [ 890.323362][T27570] ? kmsan_get_metadata+0x4f/0x180 [ 890.323362][T27570] ? kmsan_get_metadata+0x4f/0x180 [ 890.323362][T27570] __secure_computing+0x1fa/0x380 [ 890.323362][T27570] syscall_trace_enter+0x63b/0xe10 [ 890.323362][T27570] do_syscall_64+0x54/0x150 [ 890.323362][T27570] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 890.323362][T27570] RIP: 0033:0x45c1d9 [ 890.363931][T27570] Code: Bad RIP value. [ 890.363931][T27570] RSP: 002b:00007f876a531c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000136 [ 890.363931][T27570] RAX: ffffffffffffffda RBX: 0000000000024180 RCX: 000000000045c1d9 [ 890.385246][T27570] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 890.385246][T27570] RBP: 00007f876a531ca0 R08: 0000000000000000 R09: 0000000000000000 [ 890.385246][T27570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 890.385246][T27570] R13: 0000000000c9fb6f R14: 00007f876a5329c0 R15: 000000000078bf0c [ 890.457520][T27576] FAULT_INJECTION: forcing a failure. [ 890.457520][T27576] name failslab, interval 1, probability 0, space 0, times 0 [ 890.470522][T27576] CPU: 0 PID: 27576 Comm: syz-executor.2 Not tainted 5.8.0-rc5-syzkaller #0 [ 890.479245][T27576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.480397][T27576] Call Trace: [ 890.480397][T27576] dump_stack+0x1df/0x240 [ 890.480397][T27576] should_fail+0x8b7/0x9e0 [ 890.480397][T27576] __should_failslab+0x1f6/0x290 [ 890.480397][T27576] should_failslab+0x29/0x70 [ 890.480397][T27576] kmem_cache_alloc+0xd0/0xd70 [ 890.480397][T27576] ? kmsan_internal_set_origin+0x75/0xb0 [ 890.480397][T27576] ? audit_log_start+0x826/0x1270 [ 890.480397][T27576] ? kmsan_get_metadata+0x11d/0x180 [ 890.480397][T27576] audit_log_start+0x826/0x1270 [ 890.480397][T27576] ? kmsan_get_metadata+0x11d/0x180 [ 890.480397][T27576] audit_seccomp+0xbd/0x3a0 [ 890.480397][T27576] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 890.480397][T27576] __seccomp_filter+0x12ee/0x2720 [ 890.480397][T27576] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 890.480397][T27576] ? kmsan_get_metadata+0x11d/0x180 [ 890.480397][T27576] ? kmsan_get_metadata+0x11d/0x180 [ 890.480397][T27576] ? kmsan_get_metadata+0x4f/0x180 [ 890.480397][T27576] ? kmsan_get_metadata+0x4f/0x180 [ 890.480397][T27576] __secure_computing+0x1fa/0x380 [ 890.480397][T27576] syscall_trace_enter+0x63b/0xe10 [ 890.480397][T27576] do_syscall_64+0x54/0x150 [ 890.480397][T27576] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 890.480397][T27576] RIP: 0033:0x45c1d9 [ 890.480397][T27576] Code: Bad RIP value. [ 890.480397][T27576] RSP: 002b:00007fc9308d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000136 [ 890.480397][T27576] RAX: ffffffffffffffda RBX: 0000000000024180 RCX: 000000000045c1d9 [ 890.480397][T27576] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 890.480397][T27576] RBP: 00007fc9308d3ca0 R08: 0000000000000000 R09: 0000000000000000 [ 890.480397][T27576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 18:55:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x4}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 890.480397][T27576] R13: 0000000000c9fb6f R14: 00007fc9308d49c0 R15: 000000000078bf0c 18:55:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)}}, 0x20) 18:55:02 executing program 1: syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) [ 891.300172][T27591] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27591] 18:55:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000380)={0xf3, 0x95, 0x9}) 18:55:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x400000, 0x0) r2 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r2, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x2, 0xffff, 0x8000, 0x3, 0x4, 0x40, 0x7078, 0x1, r4}, &(0x7f00000002c0)=0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r6}}, 0xc) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/169, 0xa9) 18:55:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') [ 892.026095][T27604] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27604] 18:55:03 executing program 5: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:04 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000000), 0x4) ioctl$USBDEVFS_RESET(r0, 0x5514) 18:55:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{0x0}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2000, 0x0) 18:55:04 executing program 3: r0 = socket(0x11, 0x80000, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000000)={0x8}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:04 executing program 5: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') [ 892.740493][T27627] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27627] 18:55:04 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x1, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x1ff, 0x3, 0x1, 0xfffffcb5}, 0x10) 18:55:04 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000040)={{0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0x3b62, 0x7}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x40, 0x0, 0x3}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 18:55:04 executing program 5: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') [ 893.505288][T27652] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27652] 18:55:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{0x0}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x2, 0x0, 0x0, 0x7ffbffff}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000040)=0x7, 0x4) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x1a, 0x4) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000080)) 18:55:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) get_robust_list(r1, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) 18:55:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) [ 894.215640][T27673] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27673] 18:55:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x80}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 894.454027][ T32] kauditd_printk_skb: 353 callbacks suppressed [ 894.454079][ T32] audit: type=1326 audit(1595271306.241:26530): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27677 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 894.482211][ T32] audit: type=1326 audit(1595271306.241:26531): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27677 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 894.503846][ T32] audit: type=1326 audit(1595271306.241:26532): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27677 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 894.525280][ T32] audit: type=1326 audit(1595271306.251:26533): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27677 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x1, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000580)=""/4096) r1 = socket(0x1, 0x80000, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002580)=ANY=[@ANYBLOB="b4010000", @ANYRES16=r3, @ANYBLOB="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"], 0x1b4}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x48}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r7, 0x0, 0x15, 0x0, &(0x7f0000000040)) getsockopt$inet_mreqn(r7, 0x0, 0x20, &(0x7f0000000080)={@local, @remote, 0x0}, &(0x7f0000000100)=0xc) r9 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r9, 0x0, 0x15, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x74a, 0x1637, {{0x34, 0x4, 0x0, 0x1, 0xd0, 0x65, 0x0, 0x2, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, {[@cipso={0x86, 0x32, 0x3, [{0x0, 0x5, "93f65d"}, {0x6, 0x2}, {0x1, 0x12, "bb680aaa5e317a34de663096ba4007c5"}, {0x6, 0x2}, {0x6, 0x8, "29c602d4c75f"}, {0x7, 0x9, "2155acde9ad15c"}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x20, 0x92, 0x0, 0x8, [0x40, 0x0, 0x4, 0x4, 0x3, 0x10000, 0x1f]}, @ssrr={0x89, 0x13, 0xb2, [@loopback, @dev={0xac, 0x14, 0x14, 0x44}, @loopback, @local]}, @end, @end, @rr={0x7, 0x1b, 0x6c, [@remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x27}, @broadcast, @private=0xa010102, @private=0xa010101]}, @noop, @timestamp_prespec={0x44, 0x34, 0x69, 0x3, 0x1, [{@rand_addr=0x64010101, 0x2}, {@local, 0x1}, {@private=0xa010100, 0x2}, {@multicast2, 0x400}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1c02}]}]}}}}}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x78, r3, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1f, 0x1}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0x4}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfffffffd, 0x1}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xffffff81, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) [ 894.546687][ T32] audit: type=1326 audit(1595271306.251:26534): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27677 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=310 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 894.568231][ T32] audit: type=1326 audit(1595271306.251:26535): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27677 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) [ 894.589838][ T32] audit: type=1326 audit(1595271306.251:26536): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27677 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 894.611238][ T32] audit: type=1326 audit(1595271306.261:26537): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27677 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 894.632632][ T32] audit: type=1326 audit(1595271306.261:26538): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27677 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 894.653921][ T32] audit: type=1326 audit(1595271306.261:26539): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27677 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{0x0}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 894.942351][T27690] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27690] 18:55:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$SOUND_PCM_READ_RATE(r1, 0x80045002, &(0x7f0000000140)) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0x1fd8, 0xd, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1fac, 0x3, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x2}]}, {0x151c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}, @NFTA_SET_ELEM_KEY_END={0x228, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc0, 0x1, "fb14a567b436d6b41ea06e0aafdd399c578f0597e7c7ce7d9fd4ff624993e9844036e8e4a8c9172ccf260d28eaa7a18c4f6691530464ed6e8c297ae5f99b44f54e1ab4d2b0e556692ea839b0d5b754e10ae6d7bc14e067d695a93f702bd7a01516c34de1d072df6ac140274d665e68db21e30685dcf528eff742d5076385f48b1f19bc8f0d0640566c12f233ff5316199065213a9c3d95a805a868531e2f4c55f8e24d9918f337ddae06ae28b58b236930195fcb92b57a14e7ef5a33"}, @NFTA_DATA_VALUE={0xdc, 0x1, "daa32e29db3f398ba0ac8253bb1aa5475dc3c784a08861a6ba0f18a75f05bea2e21e5fbec92293805dc1e0ef06541197c965332ccd9476e203dc154c8e5ccfae2f15019f70caf207b58c439151878004f9fe49d6472b2cc38f81b1c3c0f0b35cb67c74c9ec204e2f29659c873f503c7cc272ba75bc35854c571b2984872a9e30e9a080731d51235da000a4ec77fa14fc7ea6c0c533f390e2f426c72dc8055a08bdc9662f07b60b74929797588cdaea47903ab440e15f044b19ea758fa4cbc03ae7ac88930e49d84ec07039ee53b219c3d216b92b11a868fa"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x70, 0x1, "a4594fa82eda38e191ee6a87ae981d4804b07862cf23dfbd0c1ff39300f510811d3f2953a91c928fd8bb180a88cbbbc337ce6408175cdb1953c1e36b31a3924be851c418effee2ab31270b5bc8daecec8fdb4f3c31b4e71abc3aa00cfd8d0536aab3dfb48dfe2189bfb9cbbe"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x7}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_KEY={0x130, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x46, 0x1, "93ddc0134b43f806e2aeacc09ec03044980c503ce16178163fe52e9ae2b95196fd5030952f161125a9720fb96432dd977a5294ffeca40300ca209460a0a59135ada6"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x1}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xbe, 0x1, "0b7ee3a1ccce9682fb10944050a2ab072f874ea30872df351a34e7446509610b156203ff16744d75cc2e13f01a5f2ef74cd363d07b23cde0a5a052c665b5c46fa5e81f1f0fcc102a466aaa162f84c3d80f2e231931dcfdd30bfab01c04436d72f12fc02a85e0e50045fbf59d0591d4e7b22fc5f8f44cb72290c95019a3414dd0bb46044866e0dad9dcbaf4c68ac236410c86d9bc3e7aedbda68f25aa237d6039fcb8dbe8eb23f739b77765275e1ed52b32ff5af3467525d1edfe"}]}, @NFTA_SET_ELEM_DATA={0x1198, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x97, 0x1, "5dafe458c161f058e62172a762ad297708b8ad0924c2a71624809e67c4f17e7d4bdc146e7e55fbd6b47074636ad11949d444e6aec001f2fedd2c9d881941ba241af20e5f2ec724f81352d7a78378f79e4b7457482f04252245c87335f78ca8acc53b456521eaf3b9f7a1f963a23cee46a7af02b5ae8e173b3449a487f19e230a62cf5673b3ea2a142626fe5ef89b39e3e1e3c9"}, @NFTA_DATA_VALUE={0x65, 0x1, "fbf645a950be3c5216cae4bab67a0ee3822e60d982e7962a3a34a973d52e7f967f3f6e61c7e240f8fc308560ed30d6b0604164bb3c14c98320032c86d78656637e4f4c94529480754851c6beeb00c4773f43a52d5b6e34d374bb51a67548d38f45"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x84, 0x1, "cc05cef0ea180aa409b032604e53b9352ba385e86a46a6a09627dff8bcc34ed38996fbe89a5b95ea270d9af508ff4ac972dfeed622f556039bf4ed24da9135a0c80c1b0a71120e5d1a226487be87c9326e774075993d5a7ef55a8eac72f947dec03f3a81e0ca2b1c1a43e9001b955cfa5c37445b6f1cb1779633bdfcf1ba005f"}]}]}, {0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x138, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x81, 0x6, 0x1, 0x0, "4cee97ac377c5944285ad8a99301eae0a7d8fc85e37fdfdfe76cc49159154f7af2fab151f56e6c56bc542278da1b166a1f9ed3b835c1a8122842093a6e75833b0d34489bd46e5c0faeb857fcb6585c59026f23ea90e477b1b0fa2579d27f2c346aaf80f3bdd93f4d47b14b8e8ccfa95a7a1b268bb8a06eaaee8e4d5e98"}, @NFTA_SET_ELEM_KEY={0x7c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xfff}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_KEY_END={0x20, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}]}, {0x4ac, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x284, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x12, 0x1, "b7d4ebb8ead0e0d7a9335778dc80"}, @NFTA_DATA_VALUE={0x44, 0x1, "e4b1a2c1b765dd7c25531207faded5750807f45b80e55eb053ff6def2e7f93168f90be579f88d071bbf364f0d139bcebcd49378f6be75005d3248165c2a7d9f7"}, @NFTA_DATA_VALUE={0xf2, 0x1, "ed883a4eb677b6ef909ea6e24412feca11297fb74bf67a12f47832c9fb4ca840a0a315a23d5ac482ee053fc5a72e1d0e48e49400c830b285ee38dc4c8bb27a5c8b118cf8364e56dcd6569f3fe775e32a3ab6d597a979f82d9c897777e3bf82e5c5f5415f0c4fe599bea4492ab2c064989f8a0a04d5908b702d5a53b1b178b9ce9c6db238c438ad4a2fabf0e91e7b76bb84f4f3c7159a5abc82c4743d261d10f83949efb96b93829b1464e21172ef9be3e6f34ef8140b46fc305bd59b48770a662f4832dce09e4a405eebe81a3838138601376b35f1e0b4c89aa2ed32ef868a9ed32938f060dbe73983ca250cddac"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0xc1, 0x1, "d5adf00f8cf1cbd0e4b30cee2a5400ef47fa15b5ee7ce45bf5910a0b992ecaacb41001e3e5b700d3d292e08dffb58169fc6dd6309543150e002450f6b1c038466299c71752079f2c5b45b1c2552b586d6410b63b326d196451d93fe79ae469a5fff9ba029c6fe3da257f8637c757c6fd162a7b73db21e1804790d839cedc69b779a1e851c7c54c32e845b8d482598fef3d6c9d90bfb9ae7b233489d21d19d164ee5c1d1555dd3c6267421cbd4e79ee52089e992cea49764982b6070a69"}, @NFTA_DATA_VALUE={0x6b, 0x1, "71991deea1ff6da496627e598a09b36028ef9e87336da27d10c3841d3aab496e8f3549f2ff1a97176eeddfff7d4914e85a12619544b70b34c26e6b516820fa64d792c7045c667a0ed393b432b78db6849a42e369a851754a1aeed494e5a0e9bbcd1acbf909af07"}]}, @NFTA_SET_ELEM_KEY_END={0xe0, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xcc, 0x1, "446754d240810e0d93cc10fabac576b865b5d0026515212f6dab0690992833fea30d7251dcab736a2f23d7911f4de2291ff654b30750f6d72b820f88440bb9cdad9962927075014abbd0f8c6117723b47bc5f62285ea9dbbbde2a97c21cf06600fa9e032b0766a5a70916b3bc81e18ed4acb3a745983dfaff47071a4d6d1013f8f9411fa10bc15ebea0265caeb5d1b11af3fb8a88f06eca42731d2d4de3ccc0939a7f8a5d5fe2f0690d9ad3bbb2b19f78c0c3a6c31db2b5bf22f0d24cac5e44bba3de6c72f31722b"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_USERDATA={0x37, 0x6, 0x1, 0x0, "7992eaffbb79bb53547b8555cfc3100853d52d8f00722c9c853214945a4dbf7cffd922ce531c03643ea0e74dcd84109105a42f"}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x100, 0x6, 0x1, 0x0, "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"}]}, {0x47c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x3c, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}]}, @NFTA_SET_ELEM_KEY={0x27c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x79, 0x1, "8ce08c0bef35d82254ac76810a0883db1e872b13fa721c998c2a3094ab090afa94dd6b7737c41b728ee1d257defbb98a6e15c9d42d707c5a622465aa194a462821b37518a61b0a86fc290683923e3daaaf2a076813b402ea520c331e8492abb65bcc43c38f133a379f40b4c904f01a01badf38f139"}, @NFTA_DATA_VALUE={0xf6, 0x1, "d5b4edb49dfcf43b431faa569918b5e5f9d86bee7f8c977070aecb81823dbd41f2d22f75ba01daebad0dbdc5a1c090be281878add689d5e7cdf6a93ac312cb1b2e9dca4886ac358b53b412552de34d2ec83a44d041bdcad7e5518e033ade494a30530ca3cc7211d5806972371a29947f34c27aa3d7068e66c81c5ec42bf7f77c05d20769d95099755cc70c0abd55cbdbcb918068597a300f832c8ba3786887c8dfc89b6674f8f5ede0d672249c6aab4e0f2fa8348cae1586209c01380c98ecaca81f491a235c15e904333aec684021364fcfbb227d49abda6788759d767b6f277b3a5e6309104c6b14d0dd3fc705c588ce7d"}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x18, 0x1, "102a9afd69668a53070fd1f7a9ada1fb09cbbf86"}, @NFTA_DATA_VALUE={0x32, 0x1, "be09ef3f642955df1f3a3fb1aef8c3f06321d2a09bb1693207cf1473ca2167f0ed15a5163c2ff956c73aaeb35406"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x3}]}, @NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x7fff}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_USERDATA={0xbb, 0x6, 0x1, 0x0, "ca9c6197f122f1f03284bd3a81913c606686ed77cbf2365933d887732bcd65173c2aec02de2031db927c19413d25468010f9f49a48e05adbe35bdff6a9d87e7374c4bec9113a311d90a7a3340331173a0a5eaf8b4e15fede0aa866966aed728199037a9cc89594e83e2fcbafb2a228555a08407c2df225dc840228681e5c2c3134506dd648af3cc0131aa2d39213c38215bea99e61eeb7d64982e9f53a796701231663b44e83994abee0b5c252927987832c3067162986"}, @NFTA_SET_ELEM_DATA={0xec, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x72, 0x1, "bc55ea73ed4651e51748a6e1378976b311f2abdf6d59e3563fdaff79ebd0b9cdeb3132777e1c36d8aa89e177414588db0c1322415385b43e62f89bcacddafadc973d9e520f4bb34ae55cdb6917aaaa9e7d5d3f54b3e5fce96134448161ac58ef0bad454f9d2b0ae89d7791139ecd"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x1fd8}, 0x1, 0x0, 0x0, 0x40}, 0x4000040) 18:55:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = dup2(r0, 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002580)={0x1b4, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE={0x1a0, 0x2a, "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"}]}, 0x1b4}}, 0x0) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0x84c, r3, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_IE_RIC={0x1ef, 0xb2, "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"}, @NL80211_ATTR_IE_RIC={0x132, 0xb2, "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"}, @NL80211_ATTR_BEACON_TAIL={0x511, 0xf, "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"}]}, 0x84c}, 0x1, 0x0, 0x0, 0x40080}, 0x49010) 18:55:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 18:55:08 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)={0x7ff}) setsockopt$inet_tcp_buf(r0, 0x6, 0x3b, &(0x7f0000000100)="38c34facbdbcb317f9b8dc0702d3d8f51e043be4cfa38a1a0bd49d853495e0b17b0c7edb08a3b4e04a384ba3dd5850c6ba03ff76da6a64fc9049d2d433738ad229d02b4463e0d10915e48cf67b8598595d2ee5d9df7ab48ff07ae714e805e6986bde2d042e4dcc5dbb4fd2115562fefa1a2f429354749c79f522451850e55e460314ceee8b2f005c930974d0110961dfb1a15e30944acfe45ba021ccbf97ecbd59cf9a1f4479dc6dd43cf633d9f6a49c8cd553939d61bb5a9bae88eaa57f5ba41af593bb1747673b36e784786d1578669f670d66c6dc09272610efb8f73cf18d9886748ed23b7f51b8c826f2bc0ee1", 0xef) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000380)={0xa10000, 0x1, 0x9, r1, 0x0, &(0x7f0000000340)={0x9c090a, 0x0, [], @string=&(0x7f0000000280)=0x5}}) sendmsg$IPSET_CMD_SWAP(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, 0x6, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x6}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x33}, 0x1, 0x0, 0x0, 0x80}, 0x8084) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) 18:55:08 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') [ 896.806304][T27738] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[27738] 18:55:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) 18:55:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x9, &(0x7f0000000000)=[{0xfffe, 0x3, 0x42, 0x7f}, {0x630, 0x20, 0x43, 0x5}, {0x6, 0x9, 0x6, 0x6}, {0x8, 0x1, 0x0, 0xc62}, {0x40, 0x8, 0x9, 0x4d7}, {0x8, 0x8, 0x42, 0x3}, {0x7, 0x8, 0x8, 0xb7}, {0xc5, 0x9, 0x3, 0x101}, {0x3, 0x8, 0x4}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) 18:55:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:09 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:09 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0xa, &(0x7f0000000100)=[{0x9, 0x3f, 0x96, 0x7a}, {0xdd, 0x5, 0x4f}, {0x9, 0x3, 0x1, 0x1}, {0xa58f, 0x6, 0x9, 0xff}, {0x2, 0x2, 0x1, 0x4}, {0x8, 0x2}, {0x400, 0xb, 0x1, 0x4}, {0x0, 0x4, 0x8, 0x7}, {0x8, 0x40, 0x7, 0xe7a5}, {0xe4cc, 0x1, 0x4, 0x800}]}) 18:55:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) fcntl$setown(r0, 0x8, 0xffffffffffffffff) 18:55:09 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x6, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df"}, 0x159) 18:55:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) process_vm_readv(r1, 0x0, 0x0, 0x0, 0xfffffffffffffe73, 0x0) 18:55:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) [ 898.747987][T27794] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[27794] 18:55:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') [ 898.840018][T27797] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[27797] 18:55:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:10 executing program 4: inotify_init1(0x0) 18:55:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x10000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000200)={0x28, 0x3, 0x0, {0x1, 0x7, 0x0, '^,:,$*['}}, 0x28) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x340, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000040)={0x1000, 0x10, [0x7, 0x5, 0x3, 0x200]}) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000100)={0x1000, 0xe5, "123c5ea612313fe3f6775ae8184a7d6ffdb8ed2cece9d807e9b37bbf529b3f7f9efbb59e3f1321caee44400a3f0b9b467c3e855d84ed506ed509d35cbd94b275d6cfda592ff40b1f35f97bf6766972e87b39aff41c30b4a1efce840893f4cf2ba009903152d30e028baff4b1be6fc0f078b282b4f4a9d4b7e145ba1440fa8c2d30f431b5a22625249472c4a3fc7eca3aeca4bf7962eb6ca087a9fbc5053d1a85ba08744ac617a1f4494777d5e8699c757fa81d344bf9dc6850d8063ca2e3dbd7ecfa018a001bb350df5a6b8d8b6e69e9219d70d8c713fd5d2d5c78c4b2657f0152b745f04a"}) 18:55:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e7576057", 0x35}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) ptrace$cont(0xffffffffffffffff, r1, 0x8, 0xc398) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:11 executing program 4: inotify_init1(0x0) [ 899.552235][ T32] kauditd_printk_skb: 341 callbacks suppressed [ 899.552287][ T32] audit: type=1326 audit(1595271311.341:26881): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27811 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 18:55:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) [ 899.756804][ T32] audit: type=1326 audit(1595271311.541:26882): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27817 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 [ 899.795281][T27822] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[27822] 18:55:11 executing program 4: inotify_init1(0x0) 18:55:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:55:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') [ 900.511659][ T32] audit: type=1326 audit(1595271312.301:26883): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27817 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 [ 900.568438][T27824] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[27824] 18:55:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) [ 900.755946][ T32] audit: type=1326 audit(1595271312.541:26884): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27839 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 18:55:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:55:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x84800) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000140)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x3, 0x3, 0xfff}, {0x4, 0x7f, 0x5, 0x100}, {0xfff7, 0x3, 0x4, 0x1}, {0x5, 0xfc, 0x3, 0x4}, {0x8000, 0x1b, 0xe2, 0x7}, {0x6, 0x3, 0x1, 0x6}]}, 0x10) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 900.872205][ T32] audit: type=1326 audit(1595271312.661:26885): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27843 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 18:55:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e7576057", 0x35}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 901.113009][ T32] audit: type=1326 audit(1595271312.901:26886): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27849 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 901.280574][ T32] audit: type=1326 audit(1595271312.941:26887): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27849 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 901.302266][ T32] audit: type=1326 audit(1595271312.941:26888): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27849 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) [ 901.323834][ T32] audit: type=1326 audit(1595271312.941:26889): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27849 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 901.345775][ T32] audit: type=1326 audit(1595271312.941:26890): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27849 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:13 executing program 2: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000008237f1d7124aca273d36fbbe0383f45ed6b8d0cbfd6fca8e519f32b9ccb39c03e7f66750fdba8b8adaf550f01480bc7118a79347", @ANYRES16=0x0, @ANYBLOB="000027bd7000ffdbdf25010000000c000200fdffffffffffffff08000100000000000c000400f9ffffffffffffff0c000800aed6000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x20000040}, 0x80) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000240)={{0x4, @name="0aa1263b2efbdf01d18f7bddbb31e930fc5c7d947a6f1e552f3f85049ba93e67"}, 0x8, 0xfffffffffffffff7, 0xffffffffffff8000}) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 18:55:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) inotify_init1(0x0) 18:55:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0003}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e7576057", 0x35}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:14 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) inotify_init1(0x0) 18:55:14 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x1}, 0x18) 18:55:14 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) inotify_init1(0x0) 18:55:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$tipc2(0x0) 18:55:14 executing program 2: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x48}}, 0x20000000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) 18:55:14 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e80000000a060102000000000000000003000004580007800900120073797a320000000005000300000000000900130073797a310000000008000940000000090c00018008000140ac14143605001500720000000c00184000000000000000060c001b400000000000000002090002078005000700110000000900130073797a3100000000060005404e21000008000640000002f2180002801400024000000000000000000000ffffe0000001090002007b797a31000000000800094000000000050001000700000005000100ffff00000900020073797a3200000000"], 0xe8}}, 0x40) 18:55:14 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) inotify_init1(0x0) 18:55:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3", 0x50}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$tipc2(0x0) 18:55:15 executing program 2: r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) sched_getparam(r1, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) socket$inet_udp(0x2, 0x2, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) inotify_init1(0x0) [ 903.540452][T27906] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[27906] [ 903.671243][T27911] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[27911] 18:55:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$tipc2(0x0) 18:55:15 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x2000) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={r3, 0xd33b, 0x1, [0x4]}, 0xa) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) inotify_init1(0x0) 18:55:16 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x40) 18:55:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x84800) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000140)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x3, 0x3, 0xfff}, {0x4, 0x7f, 0x5, 0x100}, {0xfff7, 0x3, 0x4, 0x1}, {0x5, 0xfc, 0x3, 0x4}, {0x8000, 0x1b, 0xe2, 0x7}, {0x6, 0x3, 0x1, 0x6}]}, 0x10) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) inotify_init1(0x0) 18:55:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3", 0x50}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 904.559639][ T32] kauditd_printk_skb: 210 callbacks suppressed [ 904.559696][ T32] audit: type=1326 audit(1595271316.352:27101): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27926 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:16 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000002580)=ANY=[@ANYBLOB="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"], 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) close(r2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000000)={0x4, 0x3, {r1}, {0xee01}, 0x101, 0x9}) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'macvlan0\x00', {0x2, 0x4e21, @rand_addr=0x64010100}}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r6}}, 0xc) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000200)={0x0, 0x0, 0x8}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000001c0)) [ 904.738525][ T32] audit: type=1326 audit(1595271316.392:27102): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27926 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 904.760248][ T32] audit: type=1326 audit(1595271316.392:27103): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27926 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 904.781958][ T32] audit: type=1326 audit(1595271316.392:27104): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27926 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 904.803425][ T32] audit: type=1326 audit(1595271316.482:27105): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27928 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 904.824888][ T32] audit: type=1326 audit(1595271316.482:27106): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27928 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 904.846471][ T32] audit: type=1326 audit(1595271316.492:27107): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27928 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 904.867901][ T32] audit: type=1326 audit(1595271316.492:27108): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27928 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 904.889324][ T32] audit: type=1326 audit(1595271316.502:27109): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27928 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 904.910730][ T32] audit: type=1326 audit(1595271316.502:27110): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=27928 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:16 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x84800) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000140)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x3, 0x3, 0xfff}, {0x4, 0x7f, 0x5, 0x100}, {0xfff7, 0x3, 0x4, 0x1}, {0x5, 0xfc, 0x3, 0x4}, {0x8000, 0x1b, 0xe2, 0x7}, {0x6, 0x3, 0x1, 0x6}]}, 0x10) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 905.182770][T27937] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[27937] 18:55:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) inotify_init1(0x0) 18:55:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x84800) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000140)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x3, 0x3, 0xfff}, {0x4, 0x7f, 0x5, 0x100}, {0xfff7, 0x3, 0x4, 0x1}, {0x5, 0xfc, 0x3, 0x4}, {0x8000, 0x1b, 0xe2, 0x7}, {0x6, 0x3, 0x1, 0x6}]}, 0x10) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) inotify_init1(0x0) 18:55:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3", 0x50}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:55:17 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) inotify_init1(0x0) 18:55:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:55:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x1, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000580)=""/4096) r1 = socket(0x1, 0x80000, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002580)=ANY=[@ANYBLOB="b4010000", @ANYRES16=r3, @ANYBLOB="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"], 0x1b4}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x48}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r7, 0x0, 0x15, 0x0, &(0x7f0000000040)) getsockopt$inet_mreqn(r7, 0x0, 0x20, &(0x7f0000000080)={@local, @remote, 0x0}, &(0x7f0000000100)=0xc) r9 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r9, 0x0, 0x15, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x74a, 0x1637, {{0x34, 0x4, 0x0, 0x1, 0xd0, 0x65, 0x0, 0x2, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, {[@cipso={0x86, 0x32, 0x3, [{0x0, 0x5, "93f65d"}, {0x6, 0x2}, {0x1, 0x12, "bb680aaa5e317a34de663096ba4007c5"}, {0x6, 0x2}, {0x6, 0x8, "29c602d4c75f"}, {0x7, 0x9, "2155acde9ad15c"}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x20, 0x92, 0x0, 0x8, [0x40, 0x0, 0x4, 0x4, 0x3, 0x10000, 0x1f]}, @ssrr={0x89, 0x13, 0xb2, [@loopback, @dev={0xac, 0x14, 0x14, 0x44}, @loopback, @local]}, @end, @end, @rr={0x7, 0x1b, 0x6c, [@remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x27}, @broadcast, @private=0xa010102, @private=0xa010101]}, @noop, @timestamp_prespec={0x44, 0x34, 0x69, 0x3, 0x1, [{@rand_addr=0x64010101, 0x2}, {@local, 0x1}, {@private=0xa010100, 0x2}, {@multicast2, 0x400}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@loopback, 0x1c02}]}]}}}}}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x78, r3, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1f, 0x1}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0x4}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfffffffd, 0x1}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xffffff81, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) 18:55:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:55:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61", 0x5d}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x400000, 0x0) r2 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r2, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x2, 0xffff, 0x8000, 0x3, 0x4, 0x40, 0x7078, 0x1, r4}, &(0x7f00000002c0)=0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r6}}, 0xc) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/169, 0xa9) 18:55:19 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) inotify_init1(0x0) 18:55:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:19 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) r1 = socket(0x2, 0x80805, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000940)={0x208, 0x0, 0x1, 0x70bd25, 0x25dfdbfb, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x8}, {0x6, 0x16, 0x1}, {0x5, 0x12, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xfffffff7}, {0x6}, {0x5}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x5}, {0x6, 0x16, 0x4}, {0x5, 0x12, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x7ff}, {0x6, 0x16, 0x8d}, {0x5}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x20}, {0x6, 0x16, 0x3ff}, {0x5}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x5}, {0x5, 0x12, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x6}, {0x6, 0x16, 0x7ff}, {0x5}}]}, 0x208}, 0x1, 0x0, 0x0, 0x4000}, 0x24008804) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) fcntl$getflags(r2, 0x40a) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r4, 0x8, 0x30}, 0xc) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0x554, 0xd, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x534, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}]}, {0x398, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_KEY={0x9c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6b, 0x1, "8a9e8049a569369756431d583dbb64b1d8e7d134b4d16b94c48587842a0ec082c21a2231ffd7b5eb38eeb1c9e3a31e53bed3aa124aff93d09124b8fb76ddd727982c5b3926ee884e119c8fd925ae25127cee28d4678165309f656084f69f7da891e1bdbae52f02"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_KEY={0x2c0, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xf6, 0x1, "eb1edd1228d10042bcfa58e5773a86875cacf4f7130a14c36b7c1b9b63210ea4a244535a94aac98f5da684f47e3dcee957c861c8b2e88736d56bab44f68ccd821fd9a95e21fdeaf9941db569eb357dd7a58185e2567bc622af766075f704512c17952d9ee2beed941e4f826fd7268dd0095fdf7f502d015c2b0d4ee912de997db55beaa39c11fd1bb37008548164223fc4e5040ea68a16769a31f175e928d57f0c07321bcf8ca3c146b4a44fc007c9f34fdec9c15a18deec2a9f2769f747663853f3ae12ac6656af602d189f70c64468137f6344d8dbc96f161dc8ee385c754faa94df7de7adf804a54f8b904e38bbfa47e2"}, @NFTA_DATA_VALUE={0x74, 0x1, "6db580f5cc6f1a3bde1f3a4fbb62bf5835fa041c999c141be34c7dde3efca6be242beec3a5b8f2b5a1f6307f79dd86c8a93650d2d74896f001fdd8c0f775abb6583aed2b4e1f3440a0e30ed6ef98f6e619e31788de5ce920c611aada9b30536295bc34b8e9d77c1e003ccbdfde9fe8bb"}, @NFTA_DATA_VALUE={0xee, 0x1, "2fc86b181017d3e9ed4e416bea666fedc8570c0d099b02ed3c6c29fdccf2046ab8a04d39c75895c7baaab11e6981dbc7f629392c70a28eef2f80ad32873492416590e3bedf1aec0341752cda782ad74531d7b3d2a1e4e48c18b6a116d7151ac12b0a57a6b281bcbeb0554330be3d576c3d223f3b18909f1201b7f7642e647e11822475bc11cda5bb147a6ad5eff1f0d32f5a77f074a634534562728bdebb4aafcb3c287b96adee8eff653bb734a662dad6a810477dc9423fab8449c1e9272d1b0e18d797a458e497e7f302845557cd212854696183c5ed29867e461d0a74ca0e417a85a911899f962891"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x14, 0x1, "5ceda1abf36f5ed8cbf434dfe9f36354"}, @NFTA_DATA_VALUE={0xb, 0x1, "8fd10cbf72a5c2"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x3f}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x1}]}, {0x190, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0xa0, 0x6, 0x1, 0x0, "abbe0ec61e5511dff60da87f39e46d7d26105dc2d9da975fc4ae49505065153b369351f111e6e944c4f0ffeaf4b43fe066414a4f92b9d964c64b8540a17aac01084449be1bb6889ce8e9d9178d53908f2ca8d8e05a487c5a2e0f25b0f8b9c67e3941b2cebe133f70029af5d603b1e71f2fd68e4214443e60925356a56ca742ea28738c56a40caec2a112b02184a36bb8adb7148b05dd9c8c438d14a3"}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_DATA={0x4}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}, @NFTA_SET_ELEM_DATA={0xb0, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x8}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x7}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x554}, 0x1, 0x0, 0x0, 0x4000}, 0x4004040) 18:55:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x400000, 0x0) r2 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r2, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x2, 0xffff, 0x8000, 0x3, 0x4, 0x40, 0x7078, 0x1, r4}, &(0x7f00000002c0)=0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r6}}, 0xc) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/169, 0xa9) 18:55:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61", 0x5d}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:20 executing program 1: process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:20 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x1, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:20 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) inotify_init1(0x0) 18:55:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x400000, 0x0) r2 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r2, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x2, 0xffff, 0x8000, 0x3, 0x4, 0x40, 0x7078, 0x1, r4}, &(0x7f00000002c0)=0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r6}}, 0xc) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/169, 0xa9) 18:55:20 executing program 1: process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:20 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x60406e8a}, {0x8, 0x9, 0xff, 0x8}, {0x5, 0x4, 0x40, 0x4}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0xc2002, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000180)={0x74c3, &(0x7f0000000080)="126163fe4adfc89442bb75628ae3f8ceb5d363de8f7422d42456f1a0e257b4d57a5f1edf3f4a1a5de8f887fd58482c79233b528c7d401a8c8c83dd3ff7ebdda80f8b89ddbddef554b9d3f066022eeb41e3c9c24a96987a6762718b7107c54c060ebaf07210a086f5ffe455c86ac17ef9ca7b2310910d6c4565eed5cacca4805b71920dfc89b742f960e2a68b097abcb8da31b1f06e52519f22e21a1f4f95726dd7afcb5c92936fde564e2d096164e1baf4efbf39e33a898e28eb9d86145016a913eb2c1d4b513ca5e72b79a30ef275a900a97357011412da8566c43ad600"}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x10001) 18:55:21 executing program 1: process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:21 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x400000, 0x0) r2 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r2, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x2, 0xffff, 0x8000, 0x3, 0x4, 0x40, 0x7078, 0x1, r4}, &(0x7f00000002c0)=0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r6}}, 0xc) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/169, 0xa9) 18:55:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61", 0x5d}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 909.713388][ T32] kauditd_printk_skb: 444 callbacks suppressed [ 909.713437][ T32] audit: type=1326 audit(1595271321.502:27555): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:21 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) inotify_init1(0x0) [ 909.829343][ T32] audit: type=1326 audit(1595271321.542:27556): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 909.851325][ T32] audit: type=1326 audit(1595271321.542:27557): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 909.872814][ T32] audit: type=1326 audit(1595271321.572:27558): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 909.894284][ T32] audit: type=1326 audit(1595271321.572:27559): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=310 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 909.915757][ T32] audit: type=1326 audit(1595271321.572:27560): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 909.937443][ T32] audit: type=1326 audit(1595271321.572:27561): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 909.959287][ T32] audit: type=1326 audit(1595271321.572:27562): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 909.980770][ T32] audit: type=1326 audit(1595271321.572:27563): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 910.002337][ T32] audit: type=1326 audit(1595271321.572:27564): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=85 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:22 executing program 5 (fault-call:1 fault-nth:0): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:22 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x48}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000100)=0x9, 0x4) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/175) [ 910.578768][T28049] FAULT_INJECTION: forcing a failure. [ 910.578768][T28049] name failslab, interval 1, probability 0, space 0, times 0 [ 910.591557][T28049] CPU: 0 PID: 28049 Comm: syz-executor.5 Not tainted 5.8.0-rc5-syzkaller #0 [ 910.600293][T28049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.601453][T28049] Call Trace: [ 910.601453][T28049] dump_stack+0x1df/0x240 [ 910.616673][T28049] should_fail+0x8b7/0x9e0 [ 910.616673][T28049] __should_failslab+0x1f6/0x290 [ 910.616673][T28049] should_failslab+0x29/0x70 [ 910.631360][T28049] kmem_cache_alloc+0xd0/0xd70 [ 910.631360][T28049] ? kmsan_internal_set_origin+0x75/0xb0 [ 910.631360][T28049] ? audit_log_start+0x826/0x1270 [ 910.631360][T28049] ? kmsan_get_metadata+0x11d/0x180 [ 910.631360][T28049] audit_log_start+0x826/0x1270 [ 910.631360][T28049] ? kmsan_get_metadata+0x11d/0x180 [ 910.631360][T28049] audit_seccomp+0xbd/0x3a0 [ 910.667896][T28049] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 910.667896][T28049] __seccomp_filter+0x12ee/0x2720 [ 910.667896][T28049] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 910.667896][T28049] ? kmsan_get_metadata+0x11d/0x180 [ 910.667896][T28049] ? kmsan_get_metadata+0x11d/0x180 [ 910.667896][T28049] ? kmsan_get_metadata+0x4f/0x180 [ 910.667896][T28049] ? kmsan_get_metadata+0x4f/0x180 [ 910.667896][T28049] __secure_computing+0x1fa/0x380 [ 910.708227][T28049] syscall_trace_enter+0x63b/0xe10 [ 910.708227][T28049] do_syscall_64+0x54/0x150 [ 910.708227][T28049] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 910.708227][T28049] RIP: 0033:0x45c1d9 [ 910.708227][T28049] Code: Bad RIP value. [ 910.708227][T28049] RSP: 002b:00007f2de54b4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 910.708227][T28049] RAX: ffffffffffffffda RBX: 0000000000027d80 RCX: 000000000045c1d9 [ 910.708227][T28049] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 910.708227][T28049] RBP: 00007f2de54b4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 910.708227][T28049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 910.708227][T28049] R13: 0000000000c9fb6f R14: 00007f2de54b59c0 R15: 000000000078bf0c 18:55:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc34", 0x64}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:23 executing program 2: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:23 executing program 4 (fault-call:1 fault-nth:0): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:55:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) [ 911.535415][T28070] FAULT_INJECTION: forcing a failure. [ 911.535415][T28070] name failslab, interval 1, probability 0, space 0, times 0 [ 911.548514][T28070] CPU: 1 PID: 28070 Comm: syz-executor.4 Not tainted 5.8.0-rc5-syzkaller #0 [ 911.557248][T28070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 911.558307][T28070] Call Trace: [ 911.558307][T28070] dump_stack+0x1df/0x240 [ 911.558307][T28070] should_fail+0x8b7/0x9e0 [ 911.558307][T28070] __should_failslab+0x1f6/0x290 [ 911.558307][T28070] should_failslab+0x29/0x70 [ 911.558307][T28070] kmem_cache_alloc+0xd0/0xd70 [ 911.593370][T28070] ? kmsan_internal_set_origin+0x75/0xb0 [ 911.593370][T28070] ? audit_log_start+0x826/0x1270 [ 911.593370][T28070] ? kmsan_get_metadata+0x11d/0x180 [ 911.606199][T28070] audit_log_start+0x826/0x1270 [ 911.606199][T28070] ? kmsan_get_metadata+0x11d/0x180 [ 911.606199][T28070] audit_seccomp+0xbd/0x3a0 [ 911.606199][T28070] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 911.606199][T28070] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 911.606199][T28070] __seccomp_filter+0x12ee/0x2720 [ 911.606199][T28070] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 911.606199][T28070] ? kmsan_get_metadata+0x11d/0x180 [ 911.606199][T28070] ? kmsan_get_metadata+0x4f/0x180 [ 911.606199][T28070] ? kmsan_get_metadata+0x4f/0x180 [ 911.606199][T28070] __secure_computing+0x1fa/0x380 [ 911.606199][T28070] syscall_trace_enter+0x63b/0xe10 [ 911.606199][T28070] do_syscall_64+0x54/0x150 [ 911.606199][T28070] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 911.606199][T28070] RIP: 0033:0x45c1d9 [ 911.606199][T28070] Code: Bad RIP value. [ 911.606199][T28070] RSP: 002b:00007fc41e021c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000126 [ 911.606199][T28070] RAX: ffffffffffffffda RBX: 0000000000008000 RCX: 000000000045c1d9 [ 911.606199][T28070] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 911.606199][T28070] RBP: 00007fc41e021ca0 R08: 0000000000000000 R09: 0000000000000000 [ 911.606199][T28070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 911.606199][T28070] R13: 0000000000c9fb6f R14: 00007fc41e0229c0 R15: 000000000078bf0c 18:55:23 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000000)={0x0, @reserved}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc34", 0x64}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:24 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:24 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x401}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:24 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x20140, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000000000010000000000003e2e90816dfd7e0c410000000c00000000"], 0x28}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x40) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0xffffffdc, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000}, 0x40000) 18:55:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc34", 0x64}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:25 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x6, 0x800) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000200)="d518f97a8e17ec6da14cb6a490c54c933d907ef9edc3a23ac0148ad9ed6411cfc7a8699a52c24609", &(0x7f0000000240)}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200080, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0xe, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4044090) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$snddsp(r3, &(0x7f0000000340)="f61ebd37953a7dc8f1c89c87b3631e62b691c4940aa544a3eab6614e5e4d8e8eb4bca4c21d08ad9c7be0cda906ffadd1106f92aa432c1fca0bddb95f66e19b75455d5e2df1cca9ac7052fd8e4a8d5adcde920c33a9eee2d6ce9a8c7693ec71ecd81687f91cd5fb0daecc4432e89ce7b79313b47bcf312cb9b4ee00234b6a63833c7bb453fe271a423086bcd8735eb36cbef34729a1af9f747e62858558d6295a8547e153ac9557766ea5f8e339dc9507a2107f9ddd50bcb11460ca0f6349bfb1df5cc205ec19064e5f589b34f75c4006471d0c4b667f7ecd387ca889341283e22347bdb82c0e35f40067f79242c773c21b4fd478510ada", 0xf7) 18:55:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x480003, 0x50) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000240)={0x8001, 0x3, 0xfffffff7, 0x8, 0x19, "9d80097573f24753ef0a904ceac9517ae7c7a8"}) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000100)="73c7eeb4b5c48d4c3a1f378dc0ab16e4507a84d0422909aec9c31c545a363d585f1ace55f03e0b575ca6acc7eff12ef8b06942cf698bff1836c96220987bdeec7dd3cdebc0cc3b6c7097e960f8218ce31049e7cec0024353779cdcf67ceddf40f5eefc208cb4a782b0348dcc64c5847835adcd777e8269e8144f1a58b88b66cd10e99c8c1ad09337806e29e9fc2fb7305159485370db5f38c923a750b55d2a9275d148a62cd9a24402ca9a4b05df280050d2a9e209988dbc49b358e61a1d92b6e9cee8442f0feaddd21a5f870405b3661c324eb683c1d8cf312261eb00e06253853144e737923ecd853de30d916013f4bf43006d0ca7a5e607b47938144b", &(0x7f0000000040)=""/79}, 0xfffffffffffffc55) 18:55:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:25 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0xdf093fb8c2303122, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) accept$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000000)={0x5, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0002}, {0x5, 0x8, 0x6, 0x703}, {0x9, 0x7, 0x5, 0x4}, {0x1000, 0x1, 0x1, 0x5}, {0x3, 0x2, 0x81, 0x20}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:26 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SOUND_OLD_MIXER_INFO(r0, 0x80304d65, &(0x7f0000000040)) inotify_init1(0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x109800, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x309040, 0x0) ioctl$KVM_GET_XSAVE(r7, 0x9000aea4, &(0x7f0000000c40)) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="bc1802000000", @ANYRES16=r6, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e0000000000000000001000038004000500080002000000000004000400"], 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r4, &(0x7f0000000c00)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000bc0)={&(0x7f00000028c0)={0x664, r6, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x27c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x13, 0x4, "6c59b784a826755d65dba957166dd7"}, @ETHTOOL_A_BITSET_MASK={0x5f, 0x5, "415c4e2e13baec3d3b5ac7077ebe516250ddb5e3304b0fefc3f383b50186fe30612227ad7913e5e4b142aff69fe12a15317d63c5583643807decbfb33748e118c01a7bde3abd008d4b148160728ad1bccb55a83fcca960cb649bd6"}, @ETHTOOL_A_BITSET_VALUE={0xf2, 0x4, "d4d979856a36255ed2e34927df6f125862832d1e66e7b250abef549752ba403f9fab8023cba065d6f1dad295de144faa773b575df90e4832e12e2b7f7abc8413839e44612fe3baa780cbc6b333431db5f866583571ef6f09790b3351f2315cf109bdfba798b6af28fb51397493bf4988351d8a3bd8bb00c71217b2fb60cb6dff673d3f2f881af753160c88dc6960f21071330c5985c6c4f75b7d452f1f2981196a915226f88c2e02aa8595f303cd87463cfd9c0c75aee2b8614af1830ec4397e648c8a17632e6f823857e29f2b50fb2413f7daab54e581969c2b6800ea16a4f057463de68643f8606e9a83cf60dd"}, @ETHTOOL_A_BITSET_MASK={0xa4, 0x5, "19f4a6ed7d4f57fd5541885879b1322b6c2889d67145388b345b3bbd7c972da6f4c2cea7102f3963ac22bb468b8728d603034a276ed700e0a3ab99b8fc4b308f983b179bfcab7e328867c4586511d90177341c3061742c3802fa64515c5f9fc9a44616b721d8e55b656dbac6ea11647a5f4798fa32a724dff75fad910a512f98f481f09ea158d5e50e26040403db68bdf4c775f4de2c24c0f43477ba2532eb98"}, @ETHTOOL_A_BITSET_BITS={0x60, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[{\x89\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\xcb%}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3dd3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xbc}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.\x84\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '%}\\[\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x50000}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x3d4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8000}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x6f, 0x5, "b433db85ed8f26872b1d5d1d080445331a01a5de83614398b706d2cc0a61d1e9392ad5e50900c9a5e99a6bffc5ca78c61c491730cb61129743e9863e769a389e4c3d8a75fa395957e27873edb3f95ed17c405a3861cb3df9562309ab9e7c7847fa5869931a7bc8559c2464"}, @ETHTOOL_A_BITSET_BITS={0x238, 0x3, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe95a}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '%!,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x227f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfed}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x33, 0x2, 'o\x19\xb5\x89*\x8e\x97\x8dW\x0e\xc4\x02\xfa\x00\xb2\xfd\xa4\xd3Y^.H\xa1*\xa2\xd8\x8dk\'Y;\xf5\tr\xd66\xf0\xf8\xff\xff\xff\xff\xff\xff\xff\xbc\xc4'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x253}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 's#]+\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ',$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0xe4, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!\'\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}, @ETHTOOL_A_BITSET_BIT_NAME={0xaa, 0x2, '@(}\x00\x1bw\x11\xb3\"j\xf7\xe4\xe3\xe4&\x06\xb2^\xc7\xc4\xca\xf3\xb6\xf7\xab,\xf8\xe6\x04\xaa\xd8RZ.%\xa6\"K\xcf\xa9C/\x83 m\xdah\xbb\x8f\xcb\x82\xd7\xa3\xaa\xb0\xfc\x1a\x06v\x14\x98\r\xd7K9!\xdc\x1c~c\xef\x82\xad\xe9\xc5!\x84\xb3\xd6 X;X\f\xa0\xa4\x84\x19FW[B]\x81\x00\xd4\x92L\xb9\xfbm\xe071\xfb\xa9\xdfO\xd6\xfb\xa9\xb3\x96\xff\x04\x11f\x1f\xf0M`r\x98e2\x9e|~k\x06C \xa3\x85\xe8i\xa7\xf3/hU\xcb \x9f\x15\xdf\x13\xc3\x97\n0\xee\x02g\xf5\xa0)\xe3\xefp\xabt\xdeq\x9d\x9d'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6333}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ',!\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\'),.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1d8c8300}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xb1, 0x5, "b00ba69768733043ffe76623fa738fe19808b140dfc7bde8ef5c6d3bbf69a483d107b850e320272a33289e8de823751d5baa34bd7b13b1abffaabb4fd8b8dc6c9dbdf32d9e742d975ba47f811bf5793f013402067b19e274ce8adbb6a4dc94906635688c54a881e4b92d792fe49548f19e364fc885b74d508a4d5b410c776429129ce9179e40024c734e75c4ca8bef4ba197a1227f5a5bd3c4c15a2b8d14a2880b50706982855369d790681a95"}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '^-)({@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '--:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}]}]}, 0x664}, 0x1, 0x0, 0x0, 0x800}, 0x800) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r9}}, 0xc) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000140)={0x3}) 18:55:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$RTC_WIE_ON(r0, 0x700f) 18:55:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf7", 0x67}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) [ 914.734807][ T32] kauditd_printk_skb: 451 callbacks suppressed [ 914.735022][ T32] audit: type=1326 audit(1595271326.522:28012): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 914.998348][ T32] audit: type=1326 audit(1595271326.552:28013): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 915.019923][ T32] audit: type=1326 audit(1595271326.552:28014): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 915.043356][ T32] audit: type=1326 audit(1595271326.562:28015): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 915.065054][ T32] audit: type=1326 audit(1595271326.562:28016): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=157 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 915.086810][ T32] audit: type=1326 audit(1595271326.562:28017): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 915.108372][ T32] audit: type=1326 audit(1595271326.562:28018): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 915.129901][ T32] audit: type=1326 audit(1595271326.582:28019): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 915.151386][ T32] audit: type=1326 audit(1595271326.582:28020): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=85 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 915.172755][ T32] audit: type=1326 audit(1595271326.582:28021): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28135 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:27 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x170) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) mmap$dsp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000013, 0x10, r0, 0x0) inotify_init1(0x800) 18:55:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x3f, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf7", 0x67}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:27 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000140)={&(0x7f0000000000)=[0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1, 0x4, 0x0, 0x66e}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000200)=0x4) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f00000002c0)=0x81) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:28 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x80800) 18:55:28 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f0000000040)=[{0xffff, 0x0, 0x0, 0x7ffc0801}, {0x41a, 0xd5, 0x40, 0xfffffff9}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf7", 0x67}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:28 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) mmap$snddsp_control(&(0x7f0000ffa000/0x3000)=nil, 0x1000, 0x4, 0x4010, r0, 0x83000000) inotify_init1(0x0) 18:55:29 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0xb2, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_MRU={0x6}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x2c}}, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x54, r2, 0xe0b, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0xc000}, 0x890) 18:55:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x2200, 0x0) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r6, 0x201, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r6, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xe0}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8800}, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=r3, @ANYBLOB="00000100"], &(0x7f0000000040)=0x8) prctl$PR_SET_FPEMU(0xa, 0x2) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:29 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x7, &(0x7f0000000080)=[{0x1f, 0x7, 0x0, 0x81}, {0x7, 0x1, 0x2, 0x2}, {0x4, 0x7f, 0x7f, 0xffff0004}, {0x2, 0x1, 0x0, 0xfff}, {0x4, 0x0, 0x8, 0x6}, {0x9, 0xf, 0x6, 0x88}, {0x1, 0x9, 0x81, 0x4f4}]}) unshare(0x8000400) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000200)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES64], 0x18}}], 0x1, 0x4048880) socket$inet6_dccp(0xa, 0x6, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffffffffffff, 0x7ff, 0x10}, 0xc) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="140098000000000000290000000800"/24], 0x18}}], 0x1, 0x4048880) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) close(0xffffffffffffffff) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$FUSE_BMAP(r0, &(0x7f00000000c0)={0x18, 0x0, 0x2, {0x8}}, 0x18) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000000)={0x0, 0x10001}) 18:55:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf71731", 0x69}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) 18:55:29 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x200400, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000000)=0x8) 18:55:30 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)='/dev/video36\x00') keyctl$clear(0x7, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x4600, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x375) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x2a0800, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}], [{@measure='measure'}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/audio\x00'}}, {@appraise='appraise'}, {@context={'context', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x3b}}]}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0x0, 0x0}) sendmmsg(r2, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x1, './file0/file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000000)}}], 0x1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r3, &(0x7f0000000d40)=ANY=[@ANYBLOB="5300000044a6aeabc81e1520000000000000001000fff64017db9820000000000000d403ffff633b27e59aa146175dd106736d173f0fc7ec6e26710000000049d2e181baf9459c5c953148c6801d2c0945c08ba8c552fc99a742200765020000000000000080812d274014ae40b8ae4f2a88d2fbea75e16a61fd063f026bd7360627ec60cb274e00da971f7ee096d74c92fad7e34bd5522d45cc36c2442eac2d224609aba9e6000000000000000000000000000000f390d71cc6092c0100b049f3fc65d61c2b3c65f2f80a61ea6e457ebc93981b20e03b86d4e999bba83a7b0ee0ce30e80600cff8ca2996e518e3e69051f6d24317f9ebfeb82ee2469fb31be3d037359f1886a0ecfea434"], 0x14f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000540)="fdc0c193f6", 0x5}], 0x1, 0x0, 0x0, 0x200008d5}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000003000000000000271e6e8d43b200bbe49f00242d05ab0acd5913c91d27d7083ba34d960f2ac73e37b97512f2c6f7f9a4d0a73a8be2bf94a1bb5e1166571e98e0bee069023834140d69b5ce764174ed85cb71a26319dd0b22da6e33463aa6e7998826a09db2ab739a5778b662695a8684682de81bc1282151ae4ffae9b355d558af60", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002400038f2458eccc9377000001009ece6754cd9569e52eb3bee2000d8f200000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xa8, 0x4000}], 0x2, 0x0) fchown(r2, 0x0, r5) fchown(r0, r1, r5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000340)}], 0x1}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r6}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80, 0x28844}], 0x2, 0x50) keyctl$chown(0x4, 0x0, r1, r6) 18:55:30 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:30 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x2, &(0x7f0000000000)=[{0x6, 0x81, 0x36, 0x10001}, {0x2, 0x7, 0x80, 0x4}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf71731", 0x69}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:31 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x3, 0x1, 0x81, 0x9}, {0x8000, 0xfe, 0x3f, 0x6}, {0xff80, 0x0, 0x0, 0x10005}]}) inotify_init1(0x0) 18:55:31 executing program 3: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=r3, @ANYBLOB="08000300fd0063000000"], &(0x7f0000000080)=0xe) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x200000000000036c, &(0x7f0000000000)=[{0x4, 0x0, 0xff, 0x2ca7}, {0x1, 0x5, 0x20, 0x77}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 919.862797][ T32] kauditd_printk_skb: 336 callbacks suppressed [ 919.862849][ T32] audit: type=1326 audit(1595271331.652:28358): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28266 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 18:55:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/141, 0x8d}, {&(0x7f0000000100)=""/60, 0x3c}], 0x2, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:32 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf71731", 0x69}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 920.335127][ T32] audit: type=1326 audit(1595271332.122:28359): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28285 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 18:55:32 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000080)=[{0x9, 0x2, 0x81, 0x401}, {0x3, 0x9, 0x4, 0x3}]}, 0x10) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr=' \x01\x00', 0x2, 0x2, 0x3ff, 0x600, 0x4, 0x40000021}) [ 920.512189][ T32] audit: type=1326 audit(1595271332.302:28360): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28290 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 920.533793][ T32] audit: type=1326 audit(1595271332.302:28361): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28290 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 920.555510][ T32] audit: type=1326 audit(1595271332.322:28362): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28290 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 920.577064][ T32] audit: type=1326 audit(1595271332.322:28363): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28290 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 920.598399][ T32] audit: type=1326 audit(1595271332.322:28364): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28290 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 920.619887][ T32] audit: type=1326 audit(1595271332.322:28365): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28290 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 920.641453][ T32] audit: type=1326 audit(1595271332.322:28366): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28290 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 920.663004][ T32] audit: type=1326 audit(1595271332.322:28367): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28290 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=54 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:32 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r3}]}, 0x48}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x2f, 0x2, 0x9, 0x7, 0x30, @local, @mcast1, 0x20, 0x10, 0x1, 0x70e0}}) inotify_init1(0x0) 18:55:32 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x98, 0x1, 0x2, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@CTA_EXPECT_MASTER={0x74, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1ff}]}, 0x98}}, 0x0) 18:55:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:33 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x5f3500c02a0fd4cf, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) inotify_init1(0x0) prctl$PR_GET_FP_MODE(0x2e) 18:55:33 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) 18:55:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:34 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrandom(&(0x7f0000000000)=""/92, 0x5c, 0x2) 18:55:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:55:34 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x2) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000340)={0x73622a85, 0x1000}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0xc88, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x4, 0x1d8, 0x9}, &(0x7f0000000100)=0x8001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x6}}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:55:34 executing program 2: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x54, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x40}]}, 0x54}}, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) connect$tipc(r3, &(0x7f0000000200)=@id={0x1e, 0x3, 0x1, {0x4e21}}, 0x10) r4 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) sendmsg$NL80211_CMD_GET_MPP(r4, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ace06134", @ANYRES16=0x0, @ANYBLOB="000225bd7100fddbdfbbbbbbbbbbbb0000"], 0x2c}, 0x1, 0x0, 0x0, 0x5}, 0xc0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="5d25f52b665e39b3d2f7086b00012000", @ANYRES16=r2, @ANYBLOB="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"], 0x190}, 0x1, 0x0, 0x0, 0x20044001}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r7}}, 0xc) r8 = openat(r5, &(0x7f0000000180)='./file0\x00', 0x0, 0x2) fcntl$setown(r8, 0x8, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) [ 922.751535][T28349] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 18:55:34 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x3, &(0x7f0000000080)=[{0x4, 0x7, 0x7f, 0x6}, {0x3, 0x1f, 0x9, 0x3d7b}, {0x4, 0x0, 0x7f, 0x7ff}]}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000002500)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) connect$can_bcm(r0, &(0x7f0000000000), 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) sendmsg$sock(r1, &(0x7f00000024c0)={&(0x7f00000000c0)=@l2tp={0x2, 0x0, @multicast1, 0x1}, 0x80, &(0x7f0000002440)=[{&(0x7f0000000140)="d59724b73f723ef49814936bae9fc41af59516664b8a79f2a33565e3761fe8eb6295b082f1534bc61540d3f594cbb86b4a9f74cffc5be06c9d43a3de149d5a15a3a4b21221451548aa0d61dabe1d039c3dbe274bca21e7c2", 0x58}, {&(0x7f00000001c0)="adaf89e6a641276b15cc665a09dc1d7f5bd38cecf87ce116674b1213ec8e5289fcbb4fff85c9428bb5db715ea1ace6080f2c4f6298611a8fc502d331526db554f699a659e17c821a7888390c3144aa04199d4386442cf868c20f493b33173fc9c613e4b2012be3ce2f9514b178597a26572d0519cb8708005d3a4e0ac1b8c83749f9605b694cf81f", 0x88}, {&(0x7f0000000340)="b493a69525164ed996c185eff8ef134e16cb229ef2e42d7787dd18d1bf9040d5f95d3a410ded3b12a00017851fe2b3a7eca831ed49717aa11358469582d8176f20db9e5fc2024abffe148e63e5a4754922380cbdc562cd8bb68fc2611149e8fb207babd1884b03033d58acefdbc51f51ee6e77988a48d95ef601b5e9aa3e4c620a96442e5fd4e871491aa414715b971cb031e29a890ccb2b1e6c99be179c74c186b0f7e1c2150d2b95889595eb3e66d5ed6a40f1f76df121a4cc6059bb422a60eab768fc7807b11d9cbbe2949a103e", 0xcf}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="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", 0x1000}], 0x5, &(0x7f0000000280)=[@mark={{0x14, 0x1, 0x24, 0x2}}], 0x18}, 0x4000) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:34 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:55:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x11, 0x0, 0x0) 18:55:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:35 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x5, &(0x7f0000000040)=[{0x7, 0x1, 0x40, 0x5}, {0x1, 0x9, 0x3, 0x100}, {0x1000, 0x3f, 0x6, 0x3ff}, {0x8000, 0x5, 0x52, 0x1}, {0xe53, 0x88, 0xfd, 0x8000}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:35 executing program 3: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x2, @empty, 'hsr0\x00'}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x8cf4, 0x0, 0x0, 0xdfb}]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:35 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0xa0, 0x4) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)='/dev/video36\x00') add_key(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, 0x0, r4) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000140019", 0x7}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000100)) splice(r0, 0x0, r2, 0x0, 0xe22c, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x4, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffc0001}, {0x5, 0x7, 0xff, 0x3}, {0x5, 0x52, 0x0, 0x1000}, {0x7, 0x81, 0x3, 0x8}]}) inotify_init1(0x0) 18:55:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x11, 0x0, 0x0) [ 923.734059][T28385] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.4'. 18:55:35 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xffff, 0x54c5, @value=0x8}) 18:55:35 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r1, 0x541e, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002580)={0x1b4, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE={0x1a0, 0x2a, "7bd56249d6f44bfda3a46c6ac2a069be149fcc0e27744981e5bb0782f5cfcf04fc15afdc23ccda3332736d3def502d9a0ccfb2272797ebe6f4a0b0d533f0676291bf5f56a262b7b9a524bca47c565bdc5392d83649189a6f1df86fa770ce6ff6e22a3dbff4495953f65366020596c114047f562012566cc67a0e45099231372e686daa107bc395fe812e8f773a0428c40eaaa3ff7aee0c3aecc155e0c93f80ddf87cb3a8a77da2eefe74d96311f046c190ef359d57e7de4d577bb1d09d896ca132a185269ca2ca33e32025d54e0328fcb0383f3d39f3b2dac143b56a3cdc19eb31e6e53692557337d972254078e9e3d5bef64005525ab60f29624f13021d564f157f884953df5af60f67d1dec539fed71c524bf3289cc367471d281a9dab12c5fce517e1b6d470970e5e86318404831f2ca34e239be1d1057491817ba5781b0a70e431a1848235b4edc17627483d023025adadae20b48dbd03432f1d77021db9964553c420338ebcd68fb86617771c405c173c6e54aaa96041b5fbeaa688b1113b7ed331e87786dc4fc56d62bcddeb7cf3fc53662dbe52334a644505"}]}, 0x1b4}}, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000003c0)=[{{&(0x7f0000000280)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="48003d02d2a74f6e49d0330000006ad00fe6140146e6b8f6eb83a66c9120ee6546ef7831026e49d935c79fead5060ab76cba6856acd3565bc0", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100677470001400028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000300", @ANYRES32=r8, @ANYBLOB], 0x48}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000140)={'batadv0\x00', r8}) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/131) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:35 executing program 1: process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x11, 0x0, 0x0) 18:55:36 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x4, [0x401, 0x6, 0x6, 0x8]}, 0xc) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10001, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0) 18:55:36 executing program 1: process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:36 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x7, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"/2654], 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000340)}], 0x1, 0x0, 0x0, 0x8000}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80, 0x28844}], 0x2, 0x50) r4 = getgid() getgroups(0x4, &(0x7f0000000000)=[0xee00, r2, r3, r4]) 18:55:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x80000) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) [ 924.818309][T28410] ptrace attach of "/root/syz-executor.3"[9974] was attempted by "/root/syz-executor.3"[28410] [ 924.868537][ T32] kauditd_printk_skb: 367 callbacks suppressed [ 924.868593][ T32] audit: type=1326 audit(1595271336.662:28735): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28405 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 924.896821][ T32] audit: type=1326 audit(1595271336.662:28736): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28405 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 924.918500][ T32] audit: type=1326 audit(1595271336.662:28737): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28405 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 924.939959][ T32] audit: type=1326 audit(1595271336.662:28738): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28405 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 924.961324][ T32] audit: type=1326 audit(1595271336.662:28739): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28405 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 924.982782][ T32] audit: type=1326 audit(1595271336.662:28740): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28405 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 925.004257][ T32] audit: type=1326 audit(1595271336.662:28741): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28405 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 925.025696][ T32] audit: type=1326 audit(1595271336.693:28742): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28405 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 925.047363][ T32] audit: type=1326 audit(1595271336.693:28743): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28405 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=54 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0) [ 925.068722][ T32] audit: type=1326 audit(1595271336.693:28744): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28405 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:36 executing program 1: process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) [ 925.121099][T28410] ptrace attach of "/root/syz-executor.3"[9974] was attempted by "/root/syz-executor.3"[28410] 18:55:37 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0xfe, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r2 = inotify_init1(0x0) write$binfmt_elf32(r2, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r4 = inotify_init1(0x0) write$binfmt_elf32(r4, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r6 = inotify_init1(0x0) write$binfmt_elf32(r6, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r6, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, 0x0, 0x23efbc2e4183e1d5, 0x0, 0x0, 0x0) 18:55:37 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:37 executing program 4: ioperm(0xfffffffffffffff9, 0x0, 0x7) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x2001c0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) inotify_init1(0x0) r1 = inotify_init1(0x0) write$binfmt_elf32(r1, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0xa59) fcntl$setown(r1, 0x8, 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r3, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r3, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x20) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000140)={r5, 0x1ff}, &(0x7f0000000180)=0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) syz_open_procfs(r6, &(0x7f0000000040)='net/ipv6_route\x00') 18:55:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) [ 925.657117][T28430] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[28430] 18:55:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0) [ 925.715850][T28436] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[28436] [ 925.772447][T28438] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[28438] 18:55:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) 18:55:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) [ 926.399071][T28438] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[28438] [ 926.432078][T28453] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[28453] 18:55:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) 18:55:38 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f0000000080)}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) pidfd_send_signal(r0, 0x1e, &(0x7f0000000000)={0x8035, 0x4}, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:38 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0x3, 0x8000, 0x78000000, &(0x7f0000ff7000/0x8000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000340)=""/4096) r1 = io_uring_setup(0x9f5, &(0x7f0000000100)={0x0, 0x0, 0xa, 0x3, 0x18d}) fstat(r1, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x11, 0x4) 18:55:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x4600, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x375) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x2a0800, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}], [{@measure='measure'}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/audio\x00'}}, {@appraise='appraise'}, {@context={'context', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x3b}}]}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0x0, 0x0}) sendmmsg(r2, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x1, './file0/file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000000)}}], 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r4, &(0x7f0000000d40)=ANY=[@ANYBLOB="5300000044a6aeabc81e1520000000000000001000fff64017db9820000000000000d403ffff633b27e59aa146175dd106736d173f0fc7ec6e26710000000049d2e181baf9459c5c953148c6801d2c0945c08ba8c552fc99a742200765020000000000000080812d274014ae40b8ae4f2a88d2fbea75e16a61fd063f026bd7360627ec60cb274e00da971f7ee096d74c92fad7e34bd5522d45cc36c2442eac2d224609aba9e6000000000000000000000000000000f390d71cc6092c0100b049f3fc65d61c2b3c65f2f80a61ea6e457ebc93981b20e03b86d4e999bba83a7b0ee0ce30e80600cff8ca2996e518e3e69051f6d24317f9ebfeb82ee2469fb31be3d037359f1886a0ecfea434"], 0x14f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000540)="fdc0c193f6", 0x5}], 0x1, 0x0, 0x0, 0x200008d5}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000003000000000000271e6e8d43b200bbe49f00242d05ab0acd5913c91d27d7083ba34d960f2ac73e37b97512f2c6f7f9a4d0a73a8be2bf94a1bb5e1166571e98e0bee069023834140d69b5ce764174ed85cb71a26319dd0b22da6e33463aa6e7998826a09db2ab739a5778b662695a8684682de81bc1282151ae4ffae9b355d558af60", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002400038f2458eccc9377000001009ece6754cd9569e52eb3bee2000d8f200000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xa8, 0x4000}], 0x2, 0x0) fchown(r2, 0x0, r6) fchown(r0, r1, r6) lchown(&(0x7f0000000040)='./file0\x00', r1, 0xee01) inotify_init1(0x0) [ 927.095665][ C1] sd 0:0:1:0: [sg0] tag#2036 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 927.106304][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB: Test Unit Ready [ 927.113138][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.122980][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.132840][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.142745][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.152559][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.162368][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.172171][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.181979][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.191792][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.201595][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.211409][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.221224][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.231027][ C1] sd 0:0:1:0: [sg0] tag#2036 CDB[c0]: 00 00 00 00 00 00 00 00 [ 927.328734][ C1] sd 0:0:1:0: [sg0] tag#2037 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 927.339394][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB: Test Unit Ready [ 927.346003][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.355874][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.365681][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.375488][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.385325][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.395198][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.405013][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.414827][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18:55:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x7, 0xfd, 0x7ffc0001}]}) inotify_init1(0x0) 18:55:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) [ 927.424619][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.434433][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.444273][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.454079][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 927.463889][ C1] sd 0:0:1:0: [sg0] tag#2037 CDB[c0]: 00 00 00 00 00 00 00 00 18:55:39 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x2000022b, &(0x7f0000000000)=[{0x80, 0x32, 0x19, 0x3}, {0x1, 0x5, 0x2, 0x30}, {0x800, 0x1b, 0xf7, 0x7f}, {0x6, 0x2, 0x83, 0x72}, {0x9, 0x4, 0x7, 0x3}, {0x2, 0xfe, 0x87, 0x8}, {0x8000, 0x0, 0x20, 0x6}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x222, 0x70bd26, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x20000804}, 0x2) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x400000080002, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x4}}, 0x51) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) sendmsg$nl_route(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000020}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x54}, 0x84) write$capi20(r2, &(0x7f0000000180)={0x10, 0x3, 0x82, 0x0, 0x8001, 0xfffffff8}, 0x10) 18:55:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x64, 0x0, 0xb, 0x0, 0x0, 0x0, {0xa}, [@NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0x9, 0x1, '{$}/\x00'}, @NFTA_COMPAT_NAME={0x9, 0x1, '(,-b\x00'}, @NFTA_COMPAT_NAME={0x6, 0x1, '^\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_COMPAT_REV={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x8080}, 0x4008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r2, 0x201, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x48}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r8}]}, 0x48}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000001c0)={'ip6gre0\x00', r8, 0x4, 0x20, 0x0, 0x0, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private0={0xfc, 0x0, [], 0x1}, 0x8, 0x700, 0x9, 0xf8}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x4c, r2, 0x2, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x57f}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x24000) inotify_init1(0x0) 18:55:39 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x483, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:39 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28}, 0x10) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x48}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl2\x00', r6, 0x29, 0x61, 0x24, 0xffff, 0x62, @mcast2, @private1, 0x7, 0x1, 0x4, 0x486}}) 18:55:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab", 0x3a, 0x11, 0x0, 0x0) 18:55:39 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x0, 0x600) semctl$SEM_INFO(r0, 0x1, 0x13, &(0x7f0000000340)=""/4096) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7e05, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000003c0), 0x24, 0x0) inotify_init1(0x0) 18:55:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab", 0x3a, 0x11, 0x0, 0x0) 18:55:40 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:40 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0001}, {0x57ca, 0x4b, 0x5, 0x9}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x179, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="4800000007050200cf1f02004000000000000000", @ANYRES32=r6, @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x2}}}, 0x24}}, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x1}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x811) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r1, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b='\xb0\x80s\xe8\xd4N\x91\xe3\xda\x92,\"C\x82D\xbb\x88\\i\xe2i\xc8\xe9\xd85\xb1\x14):M\xdcn'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e20}]}, 0x40}, 0x1, 0x0, 0x0, 0x24044804}, 0x8010) 18:55:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab", 0x3a, 0x11, 0x0, 0x0) 18:55:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x2, @multicast1}}, 0x1e) 18:55:41 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) recvfrom$l2tp6(r0, &(0x7f0000000000)=""/66, 0x42, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x20) 18:55:41 executing program 3: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r5, 0x1}}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r8}}, 0xc) write$apparmor_exec(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="65786563001000"], 0x7) 18:55:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:41 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) sendmmsg$sock(r0, &(0x7f0000003780)=[{{&(0x7f0000000000)=@ax25={{0x3, @null, 0x4}, [@bcast, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @null, @null]}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="1fd066c0c17d9ce4382a23bf8ff6f82bc434289e616558e51bdfb94e57fe097e01e0c172d2d8d975f8eafe57b2e5fee1e12dffe59f785d456fd8abaf75167978f271cd2a86ea9396bcf69e9a4045f2522bb9d0289beb58330cb3c6a351c5691434ebc358cb3d2b6745c946f5a1f4df75275b81de93bb7d9781aa2c77ddcf93725de6e326217fb0589f3817374c7c09ad01e4e17ea5d9e9d410861bcbfbeb7c88d1c87b54c9cc630cd900aa5a0de83b17a7b24042640ef31cc535a87d6739c857813ce35cb97b53f10b6a8930ae04a6fad8baa4379d73c9aa572497c0ead83fed1283e9afc0d993580c827e890c66690eba238bddd3d689548336d12fbcb7ca36362a197fffa7f4ac87be6aac1e1b6ac87711cda8cd143bae23278174a58bfc3748abb1753b0a3f0fcaf804ed7079eb7086c7af8ef273ec6b6065ac331bb02e999bf97f8da6acc1e330eb210b500bc7bd1757d7662053688b3fac97ed05b6454e9db8fa9ee99fd21597d39a80df951a15c3505167c32c21e8fe22291a7d01babbbe92d4a8e76b6338c5989ef90d6975807325e251ee1e88aeccd0df6723cb2f0dd7cfc11655b19fcb01de8d916a5b0154ade92ce258540550bd848fcbbbf8eae25844d9c592da7fc94ad05e3760a5edb186c800f1624bb92dccd6feba698c0de252a0fab0ab664b5397f33ff099bf1d9267d5aeac1eb70b3da24dde706b585673ef1c28d42d28f130724afeda6b8b7075701fb2d5e01fad43e2c58aa5a0049b24824eaf794a6b7d5472447f9e771e18c42a74d989acd11a747da91429b2d58eb58dd819e051a6b0b4f28ac81cf1502e85afb7e328730767a2683167abd6db1ae68d7e1799e4bd37a1b6636c26e4fde10a83c5575b034285edf45122f27fe8141cf585c323409ca219d3fc7adcff7ce39be9bd78742044b0d2107047131087e168f14050683b81b445a56b6a20ac151e5ac6a7f75c02ade5ac7ec781df57d36f36407042f72083bb4a1a037a30bf9a6d113dda236c801071007377473b07f4184b986aef217113a35865e40d4a3772390fc7331fa08a943b5cd9b2be3bdc1647ee5be229777882c4e53d4ca7eb59a670fe252f5e8ce22044b7661ac8651434e3f2b2537b6c513411b8ae6bf638aa47fe73de27864cec1415d47909056a77b70c2b48132399633f2927f7fb33208f1be449d919b5edb7dafa33ebc3b984d4bb8664afc836e3cf68b4ef60d3de86c740a391f75b26e5ad206b5ac837d811b2e03429b5353a936542514fe6f83e926c6a589be3a514b5962c07037f7f2f958d2d157e94684b1f20e228e1bd317c981fd744f8bfc9a770bca40df4f13c586fd6f264bb13c145e1fcd4c27d801948617572e8338691d80524416cba6c441ef7327a562ca412820ad8e4483698117155a47c748b717abbde40f9c27028454c3016678011de884a74522a603c3a67442896de6af5d887c582cc7ed38169cd1862e44388c942fff5f16662e98f87c452280a01e66abab245deb70b61de8eac265fc5b7295014d9d731b33867acc7b8fa9e29944a7300f6bf42516f7dcc74d56c9e79e68ed36501ede215a80b6c7ee99d25104430f683629e17037cac96b4eb797e8a626525e0a7d571502b74de9e48d6502fcaa55e9d8fbee76480b7cef9fa21f068fa20e673fc85655c47e1f98d479b21e6bbb3c5367891be278885901325dd537339bed276d7638b2df445c3575e633c6cb7fce7816b1d482381c2b7cea20cc749898edeb949b518a2c65b3fb6e7211d7315163fea1c87a24e88b658a7e02581dc86e566cbc1e3f65ff43f67db9365f84634c247b9d6e54c2237d7df04bb469bfc0614aa651a7fe50688c8ed85e4fed7fd5255c6a3666c7501d8625d06cf00591d234d7ed4aad4b6f15b64c6c39bf75ed2ffc6f184337962c6ee94415f86f4d6b57183a5552a6e38c41554ba191cc1c644eae4b403c48ecf025a5f7187464fb15af336e24afecff04b14345a02aa2323c589d6444c66f4c28666ffede8a3b24d073bf5ee72c02921268ea8aeca2c1bb10b4d44faff28e93c40567accbd47cc70dc6c1f638e6d5b6027db77e664f1aca49316cab52d9dbd10ab994e0efb306f151da1e0b21cbcfe838b74d1a8af0d357832a2257183cdff4c44aacadabee67dae4b8994aaa8353ca885766a748a24784559217ea4307332a09b6de831a434023bebabf0d509feb7e121e4b457f84c1dbc0de4399b3c3e20a32772423532a3db3151547ef9d82670445a490ffb6f7824a5d691aebef98f8814b0b3cb8c0b0fcc0dc55310a47acfa7cc8d272bcea8a4ae8ab51f665c2d1bac3ab69797be88317fa509cdb327b3f9b6f531ece9e636d96f5ab3405df19590dd86fbadf3c307290ae9daefdaea1d2498a7faee13c7a6e242dce152aff6e431027a90a35a1d8437ca94989a21a9fced0bffe44bc3f8b65b6ddcb50d63a3c62c845eddd3722cd1dd6f3607f93caa5d030e0e3b2078ed56d1809fe0c2ff7e41dba363034242cba2d1fd9d735288986d08325b9326a457225a076369fe4ecb2339f463300a077d9a6777eb7e17f3f57c93fe6094e130408f08706ef2e89272412647da62e49b82f9051366469bc2f2e5f256c36a82b1f91c53c04f466794691660c9bfcd11a2b6dc95fa002bbbf87a7fdd86e809ef1ba71f70081342879ac97b5f1cc90364062f8aef3fab91cacacc76ad01b3c37f851da287097df75e93578d1f6fb8cd944af0b536338c7d00be319c6946cee26074b65ffe87dce8a1e05e1d97875f968e2f734d9bb9f74d65f80520536ac78fe55e743a45fd0f7f7c4e256e8abd0e5944bd4a3f060dc7d0ebefada2951dd073122e74d6f50035bfde3d891051c594743b0e6091081e88dad6b0713f6bfdcaf2acf10df8be8209ebb74c88c1574573b20ef2629feecae4cf8962dc387e991c3ea7f06c6e460c0b0248cd209239a4aaf9e3ef2c70fe1e8e10d39aaf2f40a9d34f348c4b902e7e46096b0d46bfe53e9b6e345d6fdf99010cd8db123c9f52084e3637852cdb55da5421aa6028edb17d2155f121bfdb22acf3be335da3c832403daeb7bbff7ba7ab4d8fca65070a9751282505b4b7c17db85bd176586c7dfe63c902dc90b969dadc091e2cbfb8c1247ef781aeec7fc52b0b4d2ff8465a2dc5631486c15dd717fc266f17b4c12520cd8d215f27a3e7a5b9ea07dc32a4021e2480eefa422bf324ae60c0072edd853d7f1c197e66d5359ee0dedb2499c85baea8f9c0828802b543d4e500da8acc95a341e58e6d4cc97544c3531ba40c614975cc562abe7507a9bd0ccb7ff1322c2809bddd76f0b0d4c14ade7d13043ef32b23a047e0cb71d145fdf09dfe500f52dc8ad2a4ad1692ff2f1c8eccf19891047b4ff241d2c1128c7fc9e7fd6a0a26a6367593b538583eb520945340586b159fdcbbec1112028632b0c74b919fdb51a59fca0f0ca3214a3ab5048f0ef1e952bd4bf9615bbbabd7ffd10a82cdffc365df6ecc47be30daa4936d4e63db07c516a63e96470c87e79d550cf0cd3f4dd5cac2c1b9498f66788cf1e7c757a7b739e18138d3218051a0e444456eae36e266708a32228ddc4e834433e02a573bdec1c66079ef844dfe79f21d343426bdc77d04f8e6f235088f4fb1fb5050fdcc3366d28fede80d097573ccc003bb41d2d297f331cfd332dbaf6e7cc046afcad39c6be1e0cebd268d50891e25abb64b133df142c8047ce935bb1bdad2624e1c7878d501819147889d9659079ff7ed9f97b7a9e51ac5d29465f3e0b4742b6e94ccccf46c03dfb50fb0f4e048ab2367a05f43a1393531155f970bf6f2b2a2afe5daa1737600d4df73e35bd7ae95cae383d5175df6997d3037fcc9f00946df6b0b8ea5dad6a17ec0d495f56860d16fc229b7fdb2253f94f014696179085c302f9dc1fd81326d8af3fa873e1e348c6d8f73a437829ee88bcf244aa657549c05c3260a0858bedc08308656de2b14fe9cbb0661590a807e219e6d7ccfad6671e3603f73ecbfc35f26ac564a8e51ac89124c766ce3e727f8afba762e689c16b366bca548af053cf550f45421d6f2996fe4f5108adaca48661e4ed9400bb75e54c48c952737d7ba9d76ad75a9b7431e8f1537331d5302a19724d32d160ae2227de3ba40ba3cc30a2e909228be2469e75d31373a13bdff20950c9c9286a0a5b40af502e5b46482956459d25c40627dc737b0934ce42bb1c5538ba78321f9edd6ddb258b0746ea96171e86f710abedb7c8910c6687698cc810c1712760ded331d8065c3038123125101fb8002266ce8abb8247cc03c9c4e26d1389a009da98859e991fc9d648d8a3fe9e2ec2bdff67d5626a6879025cd6d372ca94fefb73183bf814dff960e2670b0bf1469aaf5636c027362b1a08d48b68185186f3bbdc31b43945169f42da5c56860cbd13bc7cf4de05c2115f387ae1f8f6e18ddd1a2a51b267a9a3c31ee4ca02bc255a29cd8b9fdd59388ea495ca43ccfa190acb505f8693f6ee01303668325918e7f32dca289d7a32638258c12522ff5da02c26dd82ca0292e0dfc0ad67e9ee0ef53332ae30fbfca5fc0401622a5a64a99e14307185b3d502a86cd0cc5b92c32569b1344197a008dcdcb51f0671e54c326447cd565ea7250a8f7a493356b05cf61c127c26aed36de41e8062246235d4883175b170e1c5e9a4e680a5661af134ffbb1ac7d5c74571e24cd14d2b4c18423bd191ae9f4d0ffc43591b2153600a30fb6ed7ee4e41f91542e4476b793c04bb045b028d30c6f6cc933a200729d0e7b240c7912f77adbf7a7b023c40e2caf43aef430ef1ce11f24e9e620471ffce06dfc979f9e34b0ceb919c235a09e8bf8cc1f4c60c31f6b85206fb8f4c85e361b689bf64de6f74357a5f351bb567fe64eab1d4149f661443fa08a0ae2de6e3c178e2545ce57e443cbc6100e241d87e5a1c705fe3e2c73359b6e138feb55684efa6044c14656edbf5c7acc6661b9ea5fc85bc45729c8294ffc9d7e71870b0c2d2b288353b96d3bf9ced2d082df31b850358b9bdcfd53ad6310a240d443cdba86c9b8c2a156749b7a8ce4964be1b5ee81127566daa234cd764a4a35d07d7d89405d22f50b2c8b24a7cf4c88d4fcfa28ae0382af27c9648bd2183c12baf147f8dba5124dabc5b24f3ff51b25edaf623c0fec354d5da679afa00235e139acc0299bb6ef2d90e15bcf125e754a8f6db16dec691899a5e68f5565338d3b66c2cbafc4fca98c34b60bb982d88893d2699456a7ec9dedb46689a3ba5f9a3944bbb08424acb70be91284be309120fdac1fd6661d5ba7fd3d239ffa895ef140aa4b550cd386cd8a5ba1da052d3370019c7935b10c8aca01d46efc5be6299be9ad7964206e855aea4389056bb326a0c3b796141e5e5c2103851627456899f800de7eea0836ef157bee0f2837bd22da0201155af0602d1451a3e55d8cf7b8dc0e1c18ed7aa8ae45cb01eee74e4877d71800216ee5a7952049398802f00e1a20f580798f2f94b4d2e3704e8cce7909f77efac0148e1b38ed956407ddc16c9e8f698df806c4ec223b30fe0923d524f8205aae4e7f75ea1fdaac47aacb4f9f1223aadb4183e76d9079cf8723cb7375f688bc7fdd795f6f10acee3c5d891828efa2bb35d2db31642211aa66c75d037fb2074a5c09c9dc34685bab3bd92f66dd547a061df43fd2468a583e9cdc5750c84378b3764be9e005a0a51aea1ec0468b4da328f665d86bcd7426c04fba6540b28b1deda403f84b6f19a39c333aeb4aaa54b1aaa696055036ed8166d1dd", 0x1000}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000002340)="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", 0x1000}, {&(0x7f0000000100)="7825e1e0878c506cc2bb1381167ea1f9da4197c091f24da28160e2b586b7590192212e42906c47838fd0de84dc7a22ff0fcce8ad9ea4edfc56a219dc73933078caeae4707010f3cd2dc31a65ffa4810698fa1ec4fd8b8bbef7b86df2c5ced05ea01f95539bf47f09cdb061d825ad74c6ab5ae5b71e9d29c8d94d00d30a7188d8adacf83f870875916c9347fd431f01f1e1a3001af8e52c532a386669b6ea189ba04d3c2ba249940fa20651c841d1001458c2ad1003ac31cfee5c0a54dba4c5dc510d", 0xc2}], 0x4}}, {{0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f0000000200)="9950e307f49ec3742bf594e88de70a69af2b7cfc8541be7d9c9b6949ffb8580f49f609d66a1c869479a72ba32919fbff09a350e1d0528eb3e5f0df7453803dd5112274af3865c943812d26316e61f3d4ebb1bca92c795dd3d670a0f05002744d6e4367cd1b188e874c0d9898f202d233c7ac5636326b5903ee9ca936580b630bd85fea43c56c6c8f10c7502d4e93f01858cdb40f609799d52a", 0x99}, {&(0x7f0000003340)="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", 0xfe}, {&(0x7f0000003440)="bb56ab2bdae433b05a72db6cea4ebb4ce696e5de01c4f2668ea35dcd24aabd73d164c7a20bb15094d3ef9e1d1b623fa7cbe5c0d9f43744b4d45df99d7911e5a091e07b14b0c5746cfec81dd2d411d9fb1b71cac2a1ed337019b63de8afa13c0a265196c908206c397596b3bf80d6ef3db84aaba63431c159e32595d857f3", 0x7e}, {&(0x7f00000002c0)="941251cdce3f43a6f5f4f91059609e30a199c822ad9af2a5d84b659af682ceb10c", 0x21}, {&(0x7f00000034c0)="5ab8e27c1012a9d9fbdb8c11d37dc447ed1d562b52b0d1ab40a2867818b1769e6a64641064226534624559323ae8fb289a0d614e18cf61ea5f19595d87b1fa30bf666d4a15d2e02de86e9f04f60e607d9afd40df64840db8bca09b123ca14173395e0b76cb66bf9722bd3e728f415de78310ac0d2d484b0ddb9fbec033042845cfe00af516f06a65bd9cc046042b74f942e3bbeed6de3ac651bb4b0bd6be20c337fcb020636dc0eda75f7890a93949c8bf250c06d3f2da9bd355ef7f17bd09fdaf7a44acb8995739dbef1102ead86aa07a", 0xd1}, {&(0x7f00000035c0)="a904785a3aa57e5b79626f", 0xb}, {&(0x7f0000003600)="54689c2d35ad04b7757f1bded922b9c66f665a05084780b6dab08550c12dc268b010f93450ad251407b31a3c39569608a23b56d9cafbedec4ce9b735a41519f8953f0b6a1c8bfdd1ca0682e83c96e11e78b5095a83e0a63fbbba94f3dfaa02a4455f7787239a23018391a390cae111271dbd46deca0f882b52bfbfea20d90eeafee3e522e347d1271fb339f704", 0x8d}], 0x7, &(0x7f0000003740)=[@mark={{0x14}}], 0x18}}], 0x2, 0x851) 18:55:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) 18:55:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)) 18:55:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:41 executing program 2: r0 = socket(0x1, 0x804, 0x9) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000)=0x1, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) fcntl$setstatus(r0, 0x4, 0x42800) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 929.914701][ T32] kauditd_printk_skb: 532 callbacks suppressed [ 929.914752][ T32] audit: type=1326 audit(1595271341.703:29277): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 930.079833][ T32] audit: type=1326 audit(1595271341.743:29278): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 930.101692][ T32] audit: type=1326 audit(1595271341.743:29279): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 930.123253][ T32] audit: type=1326 audit(1595271341.743:29280): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28579 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 930.144683][ T32] audit: type=1326 audit(1595271341.743:29281): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28579 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 930.166126][ T32] audit: type=1326 audit(1595271341.743:29282): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 930.187641][ T32] audit: type=1326 audit(1595271341.743:29283): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=294 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 930.209112][ T32] audit: type=1326 audit(1595271341.743:29284): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) [ 930.230920][ T32] audit: type=1326 audit(1595271341.753:29285): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28579 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 930.252471][ T32] audit: type=1326 audit(1595271341.753:29286): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28579 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) 18:55:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x11, 0x0, 0x0) 18:55:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x11, 0x0, 0x0) 18:55:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x11, 0x0, 0x0) 18:55:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x11, 0x0, 0x0) 18:55:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:44 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r3, 0x201, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20002858) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) 18:55:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0xe, 0x0, 0x0, 0x8}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket(0x2, 0x80805, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000280)={0x2, [0x0, 0x0]}) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x4e1f, @dev={0xac, 0x14, 0x14, 0x2}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000240)="a0", 0x1}], 0x1, 0x0, 0x0, 0x40085}], 0x1, 0x4080) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="140000000000000029000000080000000000faff00000000"], 0x18}}], 0x1, 0x4048880) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000200)={0x0, 'bond_slave_0\x00', {0x1}, 0x401}) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e20, 0x10000, @private0={0xfc, 0x0, [], 0x1}, 0x5032ef20}}}, 0x84) r5 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1f, 0xa8480) ioctl$EVIOCGBITSW(r5, 0x80404525, &(0x7f0000000040)=""/26) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x11, 0x0, 0x0) 18:55:44 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r1}]}, 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="487438b267b369fa0000001000010410000000000000000000b934", @ANYRES32=0x0, @ANYBLOB="1517b023b71800ed4198d1000000000020008008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000300", @ANYRES32=r4, @ANYBLOB], 0x48}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0xf06a3d235ade104c, 0x1f, 0x9, 0x1b9, 0x30, @dev={0xfe, 0x80, [], 0x1e}, @private2={0xfc, 0x2, [], 0x1}, 0x7, 0x1, 0x7ff, 0x87b4}}) r6 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100677470001400028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB, @ANYRES32=r7, @ANYBLOB], 0x48}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4802000000000104000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100675470090000008008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000300", @ANYRES32=r10, @ANYBLOB], 0x48}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000016c0)={'ip6gre0\x00', &(0x7f0000001640)={'sit0\x00', 0x0, 0x4, 0xfd, 0x8, 0x2, 0x74, @private0={0xfc, 0x0, [], 0x1}, @private2={0xfc, 0x2, [], 0x1}, 0x8, 0x40, 0x10001, 0x5}}) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001880)={&(0x7f0000001700)={0x158, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x40}, 0x10) [ 932.594789][T28644] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 18:55:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x11, 0x0, 0x0) 18:55:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = msgget$private(0x0, 0xe0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/120) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_FPEMU(0xa, 0x2) r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r1, 0x1}, 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r1, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffe}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x3}}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x80) inotify_init1(0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000140)=0x8) 18:55:44 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x200000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@local, 0x878, 0x1, 0x1, 0xe, 0x8, 0x9}, 0x20) setsockopt(r0, 0x2, 0x7ff, &(0x7f0000000000)="244993693d8a08b838d73201edccc80174366f274de5d5bbaef2ffdce15a81fc2ba30911ad502325534021f93933ca3a07fe8f078a2483c849ce4026ae89f6631ce2b25641f3155290dd23f8ef56662d71d3c921", 0x54) 18:55:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x11, 0x0, 0x0) 18:55:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$IPSET_CMD_DEL(r1, 0x0, 0x15) 18:55:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) [ 933.373004][T28648] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 18:55:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffffffffffff9, 0x88600) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000100)={&(0x7f0000000080)=[0x4, 0x9, 0x1000, 0x0], 0x4, 0x0, 0x0, r1}) 18:55:45 executing program 2: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x9}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1d}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x4004000) socket$kcm(0x29, 0x5, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x8, 0x2, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x11, 0x0, 0x0) 18:55:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0xa, &(0x7f0000000000)=[{0x3, 0x4, 0x81, 0x8}, {0x3, 0x3f, 0x8}, {0x6a, 0x8, 0x3, 0x557}, {0x9, 0x7f, 0x53, 0x80000000}, {0x4, 0x35, 0x1, 0x9b}, {0x9, 0x1, 0x6, 0x3}, {0x4, 0x3f, 0x82, 0xb4}, {0x8001, 0xe3, 0x1, 0x57f2}, {0x1, 0x6, 0xc7}, {0x100, 0xfc, 0xff}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:45 executing program 3: ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:45 executing program 2: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000), 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f00000001c0)=0x1) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4c00ffff", @ANYRES16=r1, @ANYBLOB="000826bd7000ffdbdf2510000000050033000200000005002e000100000008003c006b0c000008003400ff030000080032005400000008003200010000000500370001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x44010) 18:55:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x11, 0x0, 0x0) 18:55:46 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x4000040) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000340)=""/237, 0xed}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/223, 0xdf}, {&(0x7f0000000680)=""/213, 0xd5}], 0x8, 0x0) 18:55:46 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) socketpair(0x1a, 0x80000, 0xffff6956, &(0x7f0000000000)={0xffffffffffffffff}) r1 = inotify_init1(0x0) write$binfmt_elf32(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], 0xa59) fcntl$setown(r1, 0x8, 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$unix(r2, &(0x7f0000001200)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001180)=[{&(0x7f00000001c0)="002e14405164e9531ed58e8d52643b4fa7001c2e9dc6c5df48d2948eb1441fb88f4ef98ae82b87082189e28290bf37663e4c4e625a29dda0f1f6c23b9f27b8a1cba9f5f403d3505b3a15da0c1db892a2d736a91db422c3cdf7a87ca761f71d6f6fc5ed14bb4b358fdd95b88361e64b042584a7c50a61243071ccdc6a9811d4a157b516389b640b5b980be62848d8ccf8e0b21dcdf7edc0aa03fbee835f4c20decaee70f10cfb66c3ee1edd33cb67cf", 0xaf}, {&(0x7f0000000280)="2aa4309ab1340fbfbf977d5c36ceee", 0xf}, {&(0x7f0000000e80)="eb2ab5f1238ab13ebdd49213f0312b1f7a2a8a6da3287bd629eb60e8f08b733b9c29442ec2ec49ad09195979ba89392941ab67f4adbed2c71a3f2142e074f3b4f9945e05114f5cc7b5acaa253852c8d2426044f6cb198e483364b4e15a725da4888afda1bfb2ecd52e3975cfceaa19b072ace47f5d8d8a4a39b76dd81fc37bcd4ba52dcecc8904a0a885fbd7f51860551c7e7119d4c3ce1470174f60014613a026abf7ad011c44bee64a7f1a4fdd3ebfe9361a72356cea49085c3665caf47b446361f7bfee12969354bbb437907074d1acdd22fc7c9f43a5c5df41dde4535a4c715bf03c54", 0xe5}, {&(0x7f00000002c0)="101e604d57c8a271274098a1b71ac9b9f93ee8554e19b88b5a3e930eb8f237e1a492ad1bc84e7318619b", 0x2a}, {&(0x7f0000000f80)="a53d02c49b9a549f76476fb8f5ec3dc6e462fd14cddcf1436ff0286aed0b78d8a35657221bb5e500c9eb364af5b88d30fd9f39fd0e6b30393b173605dd27db4bf612f4609f57b257a5d1995e49094873bb308b4f6ae8950d82db8330075226ad215af2a257393e0e02ee9bf216ac825536000caf7ece00a97c0a8f467292a2724f30c739aa35fb060959b1b905d18fee63502078ab67f7611e75b066eb8a408096aaf60205030f69496827eb703e3cfc18ef7b0940c374b21957d56d4001e8b5b04e35bb0c5c7fe0", 0xc8}, {&(0x7f0000000340)="a4fc395c1156ab615e578218148e710e6e3428e7e4d02fdf222e8dcf1245dc5dbc5cd07537709e2ba045420ddaf5dfc2ec7e6f04da955ccff2793405d1df860f7d6df673d0afce85da91937a07bd433f5d79a0f038b567c24a35aba6e0b460fc23d1b0f996b5d622bff2bb47f52b6e1cd0fb29c84cf0951d", 0x78}, {&(0x7f0000001080)="59c8bf210260bace4a66fd34d0c8f3b248e383c54bc4e9b7ad71ee915a76b053d82080bd78ac75351412f7cf630bfbd0f3c8472b3047590b5a4127fe1a4cd1c0ae749c300324a578a3f2cf16e674e4cf6d4dcedb9c12fdfb9da97cab83852d8dc169bec2fe3b638d4af36c6bd82f77d5d1ba82f9dbd4cff09cc9876229327718e3382de6a27b9b0fce72ba50f6bab6e3519840db82f616150e20df6a1b79aeb8835f272e97ba66e22904298e152aa248ddad5104c694d6cf06e221baa787d7aa0c02553a4223e43e5d177028b18aa6b0c57545b033ed9f6973121355", 0xdc}], 0x7, 0x0, 0x0, 0x200000c4}, 0x20000810) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r5, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r5, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r4, 0x84, 0x78, &(0x7f0000001240)=r7, 0x4) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r3) [ 934.878313][T28724] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[28724] [ 934.917502][ T32] kauditd_printk_skb: 489 callbacks suppressed [ 934.917555][ T32] audit: type=1326 audit(1595271346.703:29776): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) [ 935.059848][T28728] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[28728] [ 935.113672][ T32] audit: type=1326 audit(1595271346.733:29777): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 935.135404][ T32] audit: type=1326 audit(1595271346.743:29778): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=277 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 935.157029][ T32] audit: type=1326 audit(1595271346.743:29779): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 935.178567][ T32] audit: type=1326 audit(1595271346.743:29780): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 935.200242][ T32] audit: type=1326 audit(1595271346.743:29781): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 935.221688][ T32] audit: type=1326 audit(1595271346.743:29782): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 935.243120][ T32] audit: type=1326 audit(1595271346.753:29783): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:47 executing program 4: prctl$PR_GET_NAME(0x10, &(0x7f0000000340)=""/4096) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x4, &(0x7f0000000000)=[{0x6, 0x6, 0xfd, 0x7ffc0001}, {0x3, 0x1, 0x33, 0x7f}, {0x8, 0x3, 0x3, 0x6}, {0x3, 0x80, 0x33, 0xbd}]}) inotify_init1(0x800) prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x1, 0x4) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @random="c52efdcc1cd6", @local]}) [ 935.264649][ T32] audit: type=1326 audit(1595271346.753:29784): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 935.286184][ T32] audit: type=1326 audit(1595271346.753:29785): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r0, r0) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0004}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:47 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x204082, 0x143) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000040)={0x2, 0x1, {0x3, 0x2, 0x0, 0x1, 0xe5}, 0xff}) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 18:55:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 18:55:47 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000140)={0xa10000, 0x8, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x990a2c, 0x9, [], @p_u16=&(0x7f0000000040)=0x2}}) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000180)={0x2, 0x100000, "0939003fc62d1272b9509bba50f0c442e62c6de467a73d8a", {0x5, 0x138}, 0x800}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) inotify_init1(0x800) 18:55:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = fcntl$getown(r0, 0x9) process_vm_readv(r1, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, &(0x7f0000001380)=[{&(0x7f0000000040)=""/141, 0x8d}, {&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000002c0)=""/45, 0x2d}, {&(0x7f0000001340)=""/54, 0x36}], 0x6, 0x0) 18:55:47 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x200001eb, &(0x7f0000000040)=[{0xff, 0xb6, 0x7, 0x5}, {0x46, 0xfe, 0x5, 0x7}, {0x7f, 0x3, 0x1d, 0x7fffffff}, {0x9, 0x3, 0xd1, 0x3}, {0x2, 0x3, 0x4, 0x1}, {0x4, 0x80, 0xfb, 0x800}, {0x100, 0x1, 0x1}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x4000040) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100677470001400028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000300", @ANYRES32=r2, @ANYBLOB="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"], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x48}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r8}]}, 0x48}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r11}]}, 0x48}}, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x4) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x1bc, 0x0, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x4c0c0}, 0x24000000) 18:55:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313a", 0x6a}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd875865534078603", 0xde}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d", 0x63}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 18:55:48 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0xfe, 0x0, 0x7ffc0003}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:48 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0xa, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:48 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000080)=""/59) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) sendto(r3, &(0x7f0000000000)="a344fbb974d3c58750cb122dce5d09c3e4b8920ace36850466a9cda3b86f1ed5d4e993e1c99764645509114790fd33669abb7487dab048fedc4f8ae252c66ca322edc184615909945c9b1f47", 0x4c, 0x10, &(0x7f0000000100)=@llc={0x1a, 0x10a, 0xff, 0xf7, 0x7, 0x8, @remote}, 0x80) inotify_init1(0x0) 18:55:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x4000040) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:48 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip_vti0\x00', &(0x7f0000000240)={'erspan0\x00', r1, 0x40, 0x700, 0x7, 0xdc8, {{0x8, 0x4, 0x3, 0x2, 0x20, 0x66, 0x0, 0x80, 0x29, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x1a}, {[@end, @generic={0x83, 0x8, "ca3d412740c2"}]}}}}}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = msgget$private(0x0, 0xe0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/120) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000040)={0x6, 'geneve0\x00', {0x7fff}, 0x7}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x48}}, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$xdp(r1, &(0x7f0000000000)={0x2c, 0xa1fe1370a15f81d8, r4, 0x4, r5}, 0x10) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = msgget$private(0x0, 0xe0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/120) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:49 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f0000000200)=[{0x6, 0x0, 0x9, 0x7ffc0001}, {0x9, 0x9, 0x81, 0x782}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000280)={0x5, 0x233b334a, 0x3, 0x4, 0x2, @stepwise={{0xfffffff8, 0x1}, {0x80000001, 0x81}, {0x7fffffff, 0x80000000}}}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000100)="d6a2cecdd5b026a1dcec64cd36ad29b88a9288e7826cd65c073a9f36c9e05b01764a71916c2b42385564b43f06bd037bfdb9320cf601b83ceafc6d817434ffd444f039a48c47e374ea447d53851ab7c9840d0a348083cc9322e564445ae15a21ff872a2dbbbda9f8d73599a46038c431a1bba853267a5174e16389a85876a8d6ffb914978787ad238cc938d1b978b177538b39172433141bb82ed22a961cc7c6d173a010497f7d17686c9de2389d768fa8a7fc6ecc7570004a979a3ebdda955ff75a8ebfba27078fb368348a740690e4d68885cb5ec2dcdf2c498dde16eb6389622773c95f8a9f1f83aae909e441e0304cc6ff4c4058e6") getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000240)=0xc) 18:55:49 executing program 4: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) rmdir(&(0x7f0000000040)='./file0\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TCSETSF(r1, 0x541e, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x102, 0x0) inotify_init1(0x0) 18:55:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x4000040) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:49 executing program 2: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x8, 0x8}, 0x8) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x4401, 0x0) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3fb, 0x8, 0x70bd26, 0x25dfdbfb, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x8080}, 0x20000005) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x541e, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) poll(&(0x7f0000000000)=[{r1, 0x8108}], 0x1, 0x109) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xfc, r3, 0x8, 0x70bd28, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x98c9dffb158a4e20}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0xfc}}, 0xc0) 18:55:49 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f0000000000)=[{0x3, 0xac, 0x43, 0x1}, {0x7, 0x9, 0x6, 0x1}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = msgget$private(0x0, 0xe0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/120) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) 18:55:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x5c, 0x1, 0x9, 0x801, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9e}}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x100}}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x81}, 0x404c805) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:50 executing program 3: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r2}}, 0x22) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x96, 0x1, "aa383e9c9463beb04963e3f1faed8fe45454fdf0447d19b75dbd7ab0afc60f91c60142dac1b8539055a734802bacb2681697b02aa9bf0748a8158306e7d273fb640bfdac192db6aee4848367bcbbb97ec8caa219a6efd35011bb2e3b353338c9494736d1040a1ad1ab7dc0e190ad7c1eac2748d076064c0b9ba2357d3c6893ef66fd796aad77daaa8a4c29318b21"}, &(0x7f0000000040), 0x1800) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup2(r0, r1) write$USERIO_CMD_REGISTER(r3, &(0x7f0000000200)={0x0, 0x9}, 0x2) 18:55:50 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = msgget$private(0x0, 0xe0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/120) 18:55:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000340)={"fb7099d6aabc49c42326094da17fcd3513a9b33b605962825bc610b6bb504a3a821a5419a71344607525f9875d1561d1b8fb40fd1b7976cd750ff41ca85f78e1368e66d572d00f3fda237d71fc015ee5022b14c9a2f2cce7677ed484f8e4cbd055b68e458c937fd5cbacd31a3dc6983e37b80d0804a2ba2d639e98fd26fdb380126c9c8f4c0bfb3276111dbb8ead7de3dc053e4f8bacc886c58034b022f7d0662d5822bdfe05948a516ba51476ec76f19ab9d6fa6284be4989f97d2988af9851501194e971917e81f11c33fecf0b50ab5c879b367f5f9898183cf95ac3e2ec5fbf1a4e31d6b3719b7cbd7b9a3289dddf7543ea5053f173b5a24c26efc558a024e587341d0daf83d0315e406f0d125b18ed0eefd97bcf9dac351933095f69eab4c6fb5329134c719a8367996264c46168f8e29e520599c8c099bf914045dff62575baa32e755b406594540552435236d2daefef3107e2c1aebaac73c2aa8579bbf541d5167b57f3d46c6b6afd0f1bdc7d3d51e248eb85298cac250344188430c210054f4b7f8c55a89b9a15c21c6566af58c7657af2976fa6ae5c922ba6f7aea1c017fd1b3cacb30f94583ceb1b9e21c029290e5dfc9a05805f1da9a22f4df3cbeea026ccbfa902f83f8569ca1e527172369c5311ee3b434c39302467011c13958fd2b785176fd049887974567945e9f357108fbfa666ea86f8a87abb616057f10f20447d6614fe3acbc00cba8e5ae1e0c10efbac34f80c363da180df5125c63327232d67dbd63b6b52f90fcf856f7ce3946bcc468e9f701213920a5639b2363b8c3d3494f96259bbcbd4b5a990b708c54193d3c4ada3a42de85ae8144e0aff324374c69aed51a7e4d4c4f9154277ba8c64a97c3670ddd94f9b7d21264d59565f98926a895c30e59fb1a6ac615a7a56e8be50036bc4f559cab88fb6bd2195479d3dbf9cd84a01d74aca2bce8e2d05ddb1cdd5e0a00e09941a8d69dd34d0e66e7777b76f9af07b6fd12c3238e768c78c2b83fba92b6f79d76697d78290c8d1d384ded32b9f1cea6db95e56ecb3147f00f09bce214331dff595c9bc2a974d49ab174c79cd8dc43bf13cf29dbdf1a7d752f2aae51aa602245e883349e9956927ac31f256f76d3db27afe5371a04feaa2d022bbc35aadc6746e53a74b53d3b271cf3cfee29ca2f9003becd08e2d3de01692ac7e778d87866c18fb07f1c47b0131dbee4c75b0e0733173d58b29c9f627aa23ed41334d41698bfedcfd08ce587e2d2b8187b7d28f82e1785db634e086eaaec24e4136e4702324f07f5f43e7f241509fcba3627e78c6055aee1fbee1fa0f5767228c2df1a4bb0baf92f63eee7814a6c0d3f2a2ec5cf702dd0085f766ed50ad64acc859005b201a071cf73077506c988a9c31d34728b7c4227300ac9a9ff62f812c4b444d1d378c911b16f08293aac320c0"}) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r3, 0x0, 0x15, 0x0, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@private0}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) 18:55:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = msgget$private(0x0, 0xe0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/120) 18:55:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000080)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r3, 0x541e, 0x0) ioctl$TCSETSW2(r3, 0x402c542c, &(0x7f0000000000)={0x800, 0x0, 0x8, 0x1, 0xea, "89f91cb285b46a79c758a1fdafacfbec784bbb", 0xfffffffa, 0x7}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000140)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000140)}}], 0x1, 0x4048880) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f0000000100)) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r7}}, 0xc) ioctl$SNAPSHOT_SET_SWAP_AREA(r5, 0x400c330d, &(0x7f0000000040)={0x10001, 0x3}) 18:55:51 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$P9_RUNLINKAT(r0, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)={r3, r4+10000000}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x8400, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r5, 0x40045542, &(0x7f0000000240)=0x40) 18:55:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:51 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0xb2, 0x94083963c596a48a}, 0x18) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r5, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r5, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000080)={r7, 0xac, 0x10, 0x9c, 0x2}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000140)={r8, 0x1000}, 0x8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) [ 939.927810][ T32] kauditd_printk_skb: 966 callbacks suppressed [ 939.927870][ T32] audit: type=1326 audit(1595271351.723:30752): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28912 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 940.123062][ T32] audit: type=1326 audit(1595271351.753:30753): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28912 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=51 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 940.145217][ T32] audit: type=1326 audit(1595271351.753:30754): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28912 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 940.166780][ T32] audit: type=1326 audit(1595271351.753:30755): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28912 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 940.188404][ T32] audit: type=1326 audit(1595271351.763:30756): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28912 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1d1) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x23, &(0x7f0000000100)=""/110, &(0x7f0000000080)=0x6e) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) signalfd(r1, &(0x7f0000000200)={[0xef]}, 0x8) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x4000, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="14080000", @ANYRES16=r5, @ANYBLOB="0102000000000000000005000000"], 0x14}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r7, 0x201, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x3c, r7, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x301207c6}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x5, 0x2, 0x5}}, 0x30) [ 940.209838][ T32] audit: type=1326 audit(1595271351.763:30757): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28912 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=277 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 940.231428][ T32] audit: type=1326 audit(1595271351.763:30758): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28912 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 940.252864][ T32] audit: type=1326 audit(1595271351.763:30759): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28916 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 940.274358][ T32] audit: type=1326 audit(1595271351.763:30760): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28912 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 940.295835][ T32] audit: type=1326 audit(1595271351.773:30761): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=28916 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:55:52 executing program 5: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r5 = socket$isdn_base(0x22, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r7, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="140000000000000029000000000000000000003b64cdf8ac"], 0x18}}], 0x1, 0x4048880) r8 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x11}, 0x10) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[0xffffffffffffffff, r3, r4, 0xffffffffffffffff, r5, r6, r7, r8], 0x8) 18:55:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) socket(0x1, 0x803, 0x0) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:52 executing program 0: msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:52 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000000)=0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:52 executing program 0: msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:53 executing program 0: msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:53 executing program 5: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r2, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)={0x40, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, r6, 0x300, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008805}, 0x5) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r4, 0x2, 0x2048, 0xb1b6, 0x8, 0x3ff}, 0x14) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x6e, 0x80, 0xe0, 0x100}, {0x354, 0x1, 0x7f, 0x9}, {0x1, 0x80, 0x40, 0x100}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) nanosleep(&(0x7f0000000380)={0x0, 0x3938700}, &(0x7f00000003c0)) 18:55:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x9, 0x4) 18:55:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x9, 0x4) 18:55:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x9, 0x4) 18:55:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x4}, &(0x7f0000000040)=0x8) 18:55:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sync_file_range(r0, 0x0, 0x9, 0x4) 18:55:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) readahead(r0, 0x9, 0x5) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:55 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) sync_file_range(0xffffffffffffffff, 0x0, 0x9, 0x4) 18:55:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:56 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) sync_file_range(0xffffffffffffffff, 0x0, 0x9, 0x4) 18:55:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:56 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) sync_file_range(0xffffffffffffffff, 0x0, 0x9, 0x4) 18:55:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sync_file_range(r0, 0x0, 0x0, 0x4) 18:55:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sync_file_range(r0, 0x0, 0x0, 0x0) 18:55:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) readahead(r0, 0x9, 0x5) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) [ 945.564109][ T32] kauditd_printk_skb: 282 callbacks suppressed [ 945.564160][ T32] audit: type=1326 audit(1595271357.353:31044): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29043 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) [ 945.680510][ T32] audit: type=1326 audit(1595271357.393:31045): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29043 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 945.702002][ T32] audit: type=1326 audit(1595271357.393:31046): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29043 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 945.723548][ T32] audit: type=1326 audit(1595271357.403:31047): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29043 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 945.745019][ T32] audit: type=1326 audit(1595271357.403:31048): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29043 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=187 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 945.766464][ T32] audit: type=1326 audit(1595271357.403:31049): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29043 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 945.787908][ T32] audit: type=1326 audit(1595271357.403:31050): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29043 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 945.809341][ T32] audit: type=1326 audit(1595271357.403:31051): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29043 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 945.830781][ T32] audit: type=1326 audit(1595271357.403:31052): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29043 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=46 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 945.852122][ T32] audit: type=1326 audit(1595271357.403:31053): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29043 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:55:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) readahead(r0, 0x9, 0x5) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:57 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000100)={0xc0000000, 0x100, "d6bb1968b12d62e2d06246243bb23f69ae32f077cb1d2e7d3b18e0444d4bf733", 0x0, 0x80000001, 0xfffffffffffffffb, 0x0, 0x3, 0x7, 0x8, 0x3, [0x6, 0x12000000, 0xffffff77, 0x27c]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x44, r3, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x5, 0x2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8e47}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc77d}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4000801) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$netlink(0x10, 0x3, 0x6) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r6, 0x1}, 0x14}}, 0x0) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x7c, r6, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x489a}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x4b}}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4001) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x13f, 0x3}}, 0x20) 18:55:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) readahead(r0, 0x9, 0x5) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) readahead(r0, 0x9, 0x5) 18:55:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) connect$inet6(r4, &(0x7f0000000240)={0xa, 0x4e23, 0x1f, @empty, 0xa5}, 0x1c) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0x0, &(0x7f0000000140)="1c5d2c30da0adb2250d2672492154a99f41cc081c741d8cf634033f334f71e62fc1c69c1f2aeb8a3ec9b120340a96fc7558e434cbd5da0e81e191bd2d61fbf2d485e7fcadd63e8f649e4a1e271311d77c41bfa26782cf7885c0140c2a37d0e5fcb554e67ccf218a224d8065dc05d30262e856cb63c080f1a38423a4f99cf3eebea9cbad59e46fa7a30dcbf6f1f133de1638d45e0ff17a51eef2d284bf7c3282079578f4a827584513d5e431c3c9f8b05b18070d9288da1e24fb317976da7fe6a4e80b6a788c97e51a1d6e8bc600a2c8e26e401e3e2"}) fcntl$setown(r0, 0x8, 0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000340)}], 0x1}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80, 0x28844}], 0x2, 0x50) getgroups(0x8, &(0x7f0000001180)=[0xee00, 0x0, 0xee01, 0x0, 0x0, 0x0, 0x0, 0x0]) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f00000011c0)={{}, {0x1, 0x5}, [{0x2, 0x1}, {0x2, 0x4}, {}, {0x2, 0x2}], {0x4, 0x7}, [{0x8, 0x1}, {0x8, 0x7}, {}, {}, {0x8, 0x8}, {0x8, 0x5}, {0x8, 0x3}, {0x8, 0x1}, {}, {0x8, 0x4, r5}], {0x10, 0x2}, {0x20, 0x4}}, 0x94, 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) tkill(r6, 0xa) [ 946.782085][T29075] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[29075] [ 946.902989][T29078] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[29078] 18:55:58 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0xa, &(0x7f0000000000)=[{0x7fff, 0x8, 0x80, 0x5}, {0x0, 0x9, 0x7f, 0x2}, {0x416c, 0x32, 0x5, 0x2}, {0xda7, 0x5, 0x3, 0xffffffff}, {0x100, 0x91, 0x1e, 0x41d}, {0x800, 0x4, 0xfb, 0x80000001}, {0x7, 0x3, 0x26}, {0xfff, 0x1, 0x3f, 0x101}, {0x4a, 0x0, 0x3, 0x5}, {0x81, 0x4, 0x1, 0x5}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) readahead(r0, 0x9, 0x5) 18:55:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x2, &(0x7f0000000000)=[{0xca86, 0x10, 0x1, 0x80}, {0x0, 0x5, 0x8b}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:55:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) 18:55:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x4a2080, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x20}, 0x1, 0x0, 0x0, 0x7514ca532327bc80}, 0x4000004) 18:55:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:55:59 executing program 1: readahead(0xffffffffffffffff, 0x9, 0x5) 18:55:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) r4 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r4, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r4, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x20) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r6, &(0x7f0000000040)=0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={r3, 0x24, 0x2, 0x0, 0x551, 0x81, 0xffff, 0x48212025, {r7, @in={{0x2, 0x4e21, @multicast1}}, 0x2, 0x5, 0x20, 0x40, 0xfffff001}}, &(0x7f0000000200)=0xb0) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) pidfd_open(r1, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:55:59 executing program 1: readahead(0xffffffffffffffff, 0x9, 0x5) [ 948.239226][T29104] ptrace attach of "/root/syz-executor.5"[11571] was attempted by "/root/syz-executor.5"[29104] 18:56:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000000)=""/120) [ 948.372553][T29109] ptrace attach of "/root/syz-executor.5"[11571] was attempted by "/root/syz-executor.5"[29109] 18:56:00 executing program 1: readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:00 executing program 2: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @rand_addr=0x64010101}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, 0x0, 0x0, 0x800}], 0x1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r3, 0x40}, 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000000)=""/62) 18:56:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7fff) 18:56:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="140000000000000029000000080000000000000000000000f1e2db39fcb2"], 0x18}}], 0x1, 0x4048880) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1, 0x3, 0x1, 0xe214}, {0x5, 0x7f, 0xfe, 0xece}, {0x400, 0x3, 0x20, 0x3ff}]}, 0x10) 18:56:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, 0x0) 18:56:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, 0x0) 18:56:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:01 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0x980000, 0x5, 0x7, r3, 0x0, &(0x7f0000000080)={0x9b0908, 0x9, [], @p_u32=&(0x7f0000000040)=0x4}}) write$UHID_CREATE2(r4, &(0x7f0000000100)={0xb, {'syz1\x00', 'syz1\x00', 'syz1\x00', 0xef, 0x9, 0xffff, 0x8, 0x1, 0x200, "be75f26db8412e60f842adf26ff6922544f3431f68a1761ddf4fac6e771867f662b932732abf6928a7e35c9653472756b3eed6fcf445f53b321c75af1452159c30dfe5d90ab83182519c10fb762311dc1faf2b2d892a459d6c9dcbb2e0f316b67301e39abcdebc6241a86cbc39a53bd4e333aca62a9e018763d2b10d704fe8ce292e75acc0cda5e6d660e397ae3d8a484885b004f50391703514af7c2377966136c5274ead346216f1ce631cd5a4d6d991c890314b216e0f52040bd5e796494ac65f1bbe6aeaabf3d27c59717e2d56329dac9db328901c0725067448f263134af54085c4fb367b906be618e0139ce2"}}, 0x207) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) msgctl$MSG_STAT_ANY(0x0, 0xd, 0x0) 18:56:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0xb2, 0x94083963c596a48a}, 0x18) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r5, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r5, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000080)={r7, 0xac, 0x10, 0x9c, 0x2}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000140)={r8, 0x1000}, 0x8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:02 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180)='ethtool\x00') sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)={0x1e4, r2, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_MODES={0x1d0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x16c, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\\-)^\x00'}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/-X\x9b&{%&/\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x72}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\*]--[$}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '(#\xd9&-$\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\\+\'@-\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\xea*&@\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\']\'%(\\)\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\x9c\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_BITS={0x5c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe681}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '--(@{,\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x47c1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x4}]}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r3, 0x541e, 0x0) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1, 0x12, 0x174, &(0x7f0000000340)}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) socket$inet_udp(0x2, 0x2, 0x0) 18:56:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) readahead(0xffffffffffffffff, 0x9, 0x5) [ 950.705969][ T32] kauditd_printk_skb: 395 callbacks suppressed [ 950.706024][ T32] audit: type=1326 audit(1595271362.494:31449): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 950.734164][ T32] audit: type=1326 audit(1595271362.504:31450): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 950.755663][ T32] audit: type=1326 audit(1595271362.504:31451): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 950.777334][ T32] audit: type=1326 audit(1595271362.504:31452): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=85 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 950.798675][ T32] audit: type=1326 audit(1595271362.504:31453): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 950.820068][ T32] audit: type=1326 audit(1595271362.514:31454): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 950.841480][ T32] audit: type=1326 audit(1595271362.514:31455): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 950.862904][ T32] audit: type=1326 audit(1595271362.514:31456): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=3 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 950.884201][ T32] audit: type=1326 audit(1595271362.514:31457): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 950.907378][ T32] audit: type=1326 audit(1595271362.514:31458): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29174 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x640441, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000040)={'\x00', @ifru_mtu=0x6e06eb86}) 18:56:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0xb2, 0x94083963c596a48a}, 0x18) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r5, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r5, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000080)={r7, 0xac, 0x10, 0x9c, 0x2}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000140)={r8, 0x1000}, 0x8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:03 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000480)={'filter\x00', 0x7, 0x4, 0x4f0, 0x110, 0x110, 0x110, 0x429, 0x408, 0x408, 0x4, 0x0, {[{{@arp={@loopback, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_hsr\x00', 'lo\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@arp={@broadcast, @private, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'gretap0\x00', 'bridge_slave_0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="d782dafa74df", @empty, @broadcast, @multicast1}}}, {{@uncond, 0xc0, 0x1e8}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:pam_console_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x540) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x2) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$P9_RUNLINKAT(r0, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)={r3, r4+10000000}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x8400, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r5, 0x40045542, &(0x7f0000000240)=0x40) 18:56:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x60) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000140)=""/97) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) prctl$PR_GET_NAME(0x10, &(0x7f0000000080)=""/8) 18:56:03 executing program 2: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000000)={r3, 0x1, 0x1000000, 0xfffffffff0000000}) sched_yield() 18:56:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$P9_RUNLINKAT(r0, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)={r3, r4+10000000}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x8400, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r5, 0x40045542, &(0x7f0000000240)=0x40) 18:56:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:04 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) 18:56:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$P9_RUNLINKAT(r0, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)={r3, r4+10000000}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x8400, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r5, 0x40045542, &(0x7f0000000240)=0x40) 18:56:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$P9_RWALK(r1, &(0x7f0000000040)={0x3d, 0x6f, 0x1, {0x4, [{0x1, 0x4, 0x4}, {0x40, 0x401, 0x5}, {0x80, 0x4, 0x3}, {0x8, 0x3, 0x1}]}}, 0x3d) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="38000000132b01020000000000000000050000080900020073797a32000000000900010073797a30000000000900010073797a3100000000"], 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f0000000040)}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 18:56:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$P9_RUNLINKAT(r0, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)={r3, r4+10000000}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x8400, 0x0) 18:56:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) readahead(0xffffffffffffffff, 0x9, 0x5) [ 953.444206][T29261] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[29261] 18:56:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0x244, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1}, [@CTA_EXPECT_NAT={0x4c, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0xe}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}]}, @CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}]}, @CTA_EXPECT_NAT={0xf0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x74, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x7}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x3}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x18}}, {0x8, 0x2, @remote}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x58, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_FLAGS={0x8}, @CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x82}}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT={0xac, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x74, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x14, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_DIR={0x8}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x10000040}, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000140)={0xfffffffffffffaac, 0x8}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$P9_RUNLINKAT(r0, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)={r3, r4+10000000}) 18:56:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) open(&(0x7f0000000080)='.\x00', 0x42000, 0xb0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000100)={0x0, @reserved}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$P9_RUNLINKAT(r0, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x5, &(0x7f0000000000)=[{0x100, 0x29, 0xda, 0xffffffff}, {0x4, 0x7f, 0x70, 0x4}, {0x3, 0x8, 0x3, 0x1}, {0x20, 0x9, 0x8, 0x3}, {0xb9f6, 0x8, 0x3, 0x61e1}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa8, r1, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2e}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffff91}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1000}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4048891}, 0x0) 18:56:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) write$P9_RUNLINKAT(r0, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) fsetxattr(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f73782e262300e86f9c2ce1be56d45bafa7550b0a4013347536d742e78da6ea14d08889cc030000001bffca632f7871e80498fa6a7102922bec8d296ec04543cfbd198eee4876f4caf221bd7f5d20f7be0b1043fb3ba739d3e1549ee02bf9efbb8d720f326ffd1ed274561b00683c07613a1d"], &(0x7f0000000080)='/\x00', 0x2, 0x0) 18:56:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000d40)=ANY=[@ANYBLOB="5300000044a6aeabc81e1520000000000000001000fff64017db9820000000000000d403ffff633b27e59aa146175dd106736d173f0fc7ec6e26710000000049d2e181baf9459c5c953148c6801d2c0945c08ba8c552fc99a742200765020000000000000080812d274014ae40b8ae4f2a88d2fbea75e16a61fd063f026bd7360627ec60cb274e00da971f7ee096d74c92fad7e34bd5522d45cc36c2442eac2d224609aba9e6000000000000000000000000000000f390d71cc6092c0100b049f3fc65d61c2b3c65f2f80a61ea6e457ebc93981b20e03b86d4e999bba83a7b0ee0ce30e80600cff8ca2996e518e3e69051f6d24317f9ebfeb82ee2469fb31be3d037359f1886a0ecfea434"], 0x14f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000540)="fdc0c193f6", 0x5}], 0x1, 0x0, 0x0, 0x200008d5}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000003000000000000271e6e8d43b200bbe49f00242d05ab0acd5913c91d27d7083ba34d960f2ac73e37b97512f2c6f7f9a4d0a73a8be2bf94a1bb5e1166571e98e0bee069023834140d69b5ce764174ed85cb71a26319dd0b22da6e33463aa6e7998826a09db2ab739a5778b662695a8684682de81bc1282151ae4ffae9b355d558af60", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="000000001c000000160000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002400038f2458eccc9377000001009ece6754cd9569e52eb3bee2000d8f200000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xa8, 0x4000}], 0x2, 0x0) fchown(0xffffffffffffffff, 0x0, r2) fchown(0xffffffffffffffff, 0x0, r2) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) r4 = inotify_init1(0x0) write$binfmt_elf32(r4, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r6 = inotify_init1(0x0) write$binfmt_elf32(r6, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/50, 0x32}, {&(0x7f0000000200)=""/102, 0x66}], 0x2, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x2, 0x0, 0x0, 0x0, r3, 0x80, 0x9b93}, 0x0, 0x0, 0xffff, 0xfffffffffffffffc, 0x9, 0x1, 0x3ad5, 0x0, 0x23, 0x62, r5, r7}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 955.288968][ C0] sd 0:0:1:0: [sg0] tag#2038 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 955.299671][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB: Test Unit Ready [ 955.306301][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.316257][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.326204][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.336174][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.346128][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.354795][T29319] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[29319] [ 955.356030][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.376166][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.386070][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.395980][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.405885][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.415767][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.425672][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 955.435543][ C0] sd 0:0:1:0: [sg0] tag#2038 CDB[c0]: 00 00 00 00 00 00 00 00 18:56:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) [ 955.497756][T29320] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[29320] 18:56:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x80000000, 0x4) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:07 executing program 5: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)='/dev/video36\x00') keyctl$clear(0x7, r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r1, 0x0, 0x15, 0x0, &(0x7f0000000040)) getsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="e43eba2eebf7f42fa01d49f7b46b36d0b3b9937ccd4eef7ba658", 0x1a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0x0, 0x0}) sendmmsg(r3, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x1, './file0/file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000000)}}], 0x1, 0x0) r4 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r5, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000540)="fdc0c193f6", 0x5}], 0x1, 0x0, 0x0, 0x200008d5}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000003000000000000271e6e8d43b200bbe49f00242d05ab0acd5913c91d27d7083ba34d960f2ac73e37b97512f2c6f7f9a4d0a73a8be2bf94a1bb5e1166571e98e0bee069023834140d69b5ce764174ed85cb71a26319dd0b22da6e33463aa6e7998826a09db2ab739a5778b662695a8684682de81bc1282151ae4ffae9b355d558af60", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002400038f2458eccc9377000001009ece6754cd9569e52eb3bee2000d8f200000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xa8, 0x4000}], 0x2, 0x0) fchown(r3, 0x0, r7) fchown(0xffffffffffffffff, 0x0, r7) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000001c0)={0x5d, 0x7d, 0x2, {{0x0, 0x3c, 0x0, 0x8, {0x4, 0x2, 0x5}, 0x0, 0x0, 0x200, 0x9, 0x6, 'rxrpc\x00', 0x1, ',', 0x1, ':', 0x1, '&'}, 0xc, 'id_resolver\x00'}}, 0x5d) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000100)='\x00') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) [ 955.910392][ T32] kauditd_printk_skb: 801 callbacks suppressed [ 955.910451][ T32] audit: type=1326 audit(1595271367.704:32260): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29326 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 956.020472][ T32] audit: type=1326 audit(1595271367.734:32261): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29326 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 956.042421][ T32] audit: type=1326 audit(1595271367.734:32262): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29326 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 956.063934][ T32] audit: type=1326 audit(1595271367.754:32263): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29326 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 956.085650][ T32] audit: type=1326 audit(1595271367.754:32264): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29326 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=51 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) readahead(0xffffffffffffffff, 0x9, 0x5) [ 956.107132][ T32] audit: type=1326 audit(1595271367.754:32265): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29326 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 956.128669][ T32] audit: type=1326 audit(1595271367.754:32266): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29326 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 956.150368][ T32] audit: type=1326 audit(1595271367.754:32267): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29326 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 956.165279][ C1] sd 0:0:1:0: [sg0] tag#1990 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 956.172168][ T32] audit: type=1326 audit(1595271367.764:32268): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29326 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=54 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 956.182074][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB: Test Unit Ready [ 956.182185][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.182302][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.203544][ T32] audit: type=1326 audit(1595271367.764:32269): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29326 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 956.209932][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.260211][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.270013][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.279821][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.289628][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.299415][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.309212][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.319021][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.329006][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.338813][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.348617][ C1] sd 0:0:1:0: [sg0] tag#1990 CDB[c0]: 00 00 00 00 00 00 00 00 18:56:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) mq_timedsend(r0, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) [ 956.575782][ C1] sd 0:0:1:0: [sg0] tag#1991 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 956.586433][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB: Test Unit Ready [ 956.593272][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.603075][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.612894][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.622823][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.632647][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.642469][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.652257][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.662051][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18:56:08 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x541e, 0x0) ioctl$TIOCSBRK(r0, 0x5427) [ 956.671868][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.681700][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.691524][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.701349][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 956.711187][ C1] sd 0:0:1:0: [sg0] tag#1991 CDB[c0]: 00 00 00 00 00 00 00 00 18:56:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) dup(r1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x200800, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x4800c2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x2, 0x61, 0x10, 0x18}, [@ldst={0x5, 0x1, 0x2, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x111, 0x8}}, 0xffffffffffffff75) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000000)='[&#^^\x00', &(0x7f0000000100)="53306ba66f3d472d8ef9846325c7c6036cb6da445451c5d1f4295fbc5abf528b65e081a31173ed8114fc70998d6fdedd4a59e103ff7a8a5598a42dbd2d706f5cef6f630d073e67a6d7498382bf8ba7ab464a837a3eea9e1f78fe6d95334fdc0bb5dcb4a81390c29ceca13a5bd6819946f83d50e4b3659756b564c654a779bd2f239baa3907c378e228967e27b8e0ba74", 0x90) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002580)={0x1b4, r6, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE={0x1a0, 0x2a, "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"}]}, 0x1b4}}, 0x0) sendmsg$NL80211_CMD_START_AP(r4, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x274, r6, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x1bde0e}, @NL80211_ATTR_IE={0x258, 0x2a, "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"}]}, 0x274}, 0x1, 0x0, 0x0, 0x40}, 0x4000) 18:56:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) readahead(0xffffffffffffffff, 0x9, 0x5) 18:56:09 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x80, 0x7ffc0001}]}) 18:56:09 executing program 5: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket(0x1e, 0x80805, 0x0) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r6}}, 0xc) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000200)=""/112) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0xdc1, 0x0, 0x20, 0x4, r3}, &(0x7f0000000040)=0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:09 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0x4) 18:56:09 executing program 0: mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x400, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)=0x800) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:10 executing program 0: mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) readahead(0xffffffffffffffff, 0x0, 0x5) 18:56:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x308, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="140000000000000029001f238a1421aa0000080000000400000000000000b9ed0acc685b0fec6661330a6943b4efca64d769539c69"], 0x18}}], 0x1, 0x96651d3192b20a44) r5 = accept4(r1, &(0x7f0000000100)=@ethernet={0x0, @remote}, &(0x7f0000000080)=0x80, 0x80800) getsockopt$inet_mreq(r5, 0x0, 0x23, &(0x7f0000000180)={@initdev, @initdev}, &(0x7f00000001c0)=0x8) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r8}}, 0xc) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r6, 0x4122, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:10 executing program 0: mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x54, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x40}]}, 0x54}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="90000000911de657258fb646ef979d2b0ee663e4269881c0c062a7c23f52bd03a6a7d5b2c34a1f64f43b3d5530ac9370a03d9a65de3297640f444d805d6fe39475adfc166bbeee3bbb6c46ce0ad7867c96fd1aff6f1f64b800fe64e75de4fab26b9621ff73327d53ac3132af71ebe27063f948f95fc645d5833e061996bfc2ed4de06537210466f915f835ae04f0", @ANYRES16=r3, @ANYBLOB="01002abd7000fedbdf25020000007c0005801c00028008000400b99c000008000200ec050000080003000400000007000100696200005400028008000400080000000800030004000000080004000300000008000200000000000800020007000000080004005f01000008000300ff000000080001000000000008000300ff030000080001001e000000"], 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) 18:56:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) readahead(0xffffffffffffffff, 0x0, 0x0) 18:56:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) [ 959.111084][T29409] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.5'. [ 959.218628][T29412] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.5'. 18:56:11 executing program 2: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) recvmsg$kcm(r0, &(0x7f0000001740)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000001580)=[{&(0x7f0000000080)=""/56, 0x38}, {&(0x7f0000000100)=""/61, 0x3d}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/54, 0x36}, {&(0x7f0000000180)=""/147, 0x93}, {&(0x7f0000000240)=""/84, 0x54}, {&(0x7f0000001340)=""/187, 0xbb}, {&(0x7f00000002c0)=""/7, 0x7}, {&(0x7f0000001400)=""/195, 0xc3}, {&(0x7f0000001500)=""/121, 0x79}], 0xa, &(0x7f0000001640)=""/246, 0xf6}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001780)='/dev/vcs\x00', 0x442, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x81) 18:56:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) dup(r1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x200800, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x4800c2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x2, 0x61, 0x10, 0x18}, [@ldst={0x5, 0x1, 0x2, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x111, 0x8}}, 0xffffffffffffff75) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000000)='[&#^^\x00', &(0x7f0000000100)="53306ba66f3d472d8ef9846325c7c6036cb6da445451c5d1f4295fbc5abf528b65e081a31173ed8114fc70998d6fdedd4a59e103ff7a8a5598a42dbd2d706f5cef6f630d073e67a6d7498382bf8ba7ab464a837a3eea9e1f78fe6d95334fdc0bb5dcb4a81390c29ceca13a5bd6819946f83d50e4b3659756b564c654a779bd2f239baa3907c378e228967e27b8e0ba74", 0x90) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002580)={0x1b4, r6, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE={0x1a0, 0x2a, "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"}]}, 0x1b4}}, 0x0) sendmsg$NL80211_CMD_START_AP(r4, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x274, r6, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x1bde0e}, @NL80211_ATTR_IE={0x258, 0x2a, "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"}]}, 0x274}, 0x1, 0x0, 0x0, 0x40}, 0x4000) 18:56:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:11 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDCTL_DSP_SETDUPLEX(r0, 0x5016, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x4, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0001}, {0xe6c, 0x9, 0x1}, {0x20, 0x7f, 0x7f, 0x7}, {0x0, 0x21, 0x9, 0x3}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000340)='gtp\x00', 0x4) sendmmsg$inet6(r3, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x48}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000080)={@mcast1, @dev, @empty, 0x4, 0x9, 0x8, 0x100, 0xc00, 0x1, r6}) 18:56:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) open(&(0x7f0000000080)='.\x00', 0x42000, 0xb0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000100)={0x0, @reserved}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x541e, 0x0) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={r3, @in={{0x2, 0x4e20, @multicast2}}}, 0x84) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000200)={0x3, 0xfb, 0x81, 0x1, 0x7}) r4 = socket$kcm(0x29, 0xd, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100677470001400028008000100", @ANYRES32, @ANYBLOB="c7c78bfcedaee5cfd8a8b654dfb7809e", @ANYRES32, @ANYBLOB="0800a5ea", @ANYRES32=r7, @ANYBLOB="6d62dce53c1acf4f3626c67b309afe0e8db71374995f48e978e588749d5ba4a7ce4acbb9d5f2bf29dcab5b1435913ebb9b2b7be5da40fdbcd02c8db8e9239dfa531fd8"], 0x48}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000000)={'wg0\x00', r7}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x90d02, 0x0) getsockopt$inet_dccp_buf(r8, 0x21, 0x8f, &(0x7f0000000180)=""/85, &(0x7f0000000280)=0x55) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:12 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r3}]}, 0x48}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)={'ip6gre0\x00', r3, 0x4, 0x0, 0x20, 0x10000000, 0x4, @empty, @rand_addr=' \x01\x00', 0x72c, 0x10, 0x8, 0x8}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) open(&(0x7f0000000080)='.\x00', 0x42000, 0xb0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000100)={0x0, @reserved}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) [ 960.806450][T29459] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 960.816117][T29459] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 18:56:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) open(&(0x7f0000000080)='.\x00', 0x42000, 0xb0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000100)={0x0, @reserved}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 961.043634][ T32] kauditd_printk_skb: 645 callbacks suppressed [ 961.043688][ T32] audit: type=1326 audit(1595271372.834:32915): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29473 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 961.071816][ T32] audit: type=1326 audit(1595271372.844:32916): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29473 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 961.093276][ T32] audit: type=1326 audit(1595271372.844:32917): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29473 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 961.115049][ T32] audit: type=1326 audit(1595271372.844:32918): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29473 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=240 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 961.136532][ T32] audit: type=1326 audit(1595271372.844:32919): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29473 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 961.158467][ T32] audit: type=1326 audit(1595271372.854:32920): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29473 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 961.179999][ T32] audit: type=1326 audit(1595271372.854:32921): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29473 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 961.201478][ T32] audit: type=1326 audit(1595271372.854:32922): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29473 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=85 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 961.222853][ T32] audit: type=1326 audit(1595271372.854:32923): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29473 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 961.244358][ T32] audit: type=1326 audit(1595271372.854:32924): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29473 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) open(&(0x7f0000000080)='.\x00', 0x42000, 0xb0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000100)={0x0, @reserved}) 18:56:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x5, &(0x7f0000000000)=[{0x1, 0x9, 0x0, 0x4}, {0x4, 0x1f, 0xfe, 0x400}, {0xff, 0xec, 0x5, 0xa9}, {0x6b, 0xff, 0x9, 0x400}, {0x6, 0x0, 0xf7, 0xfffffffb}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x7b5) 18:56:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) open(&(0x7f0000000080)='.\x00', 0x42000, 0xb0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 18:56:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x5c1041, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x11fe39) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:14 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r6, &(0x7f0000000140), &(0x7f0000000200)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000240)={0x8, 0x1, 0x7, 0x101}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x6}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) open(&(0x7f0000000080)='.\x00', 0x42000, 0xb0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 18:56:14 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x20, 0x4, 0x6, 0x1}, {0x0, 0x6, 0x5, 0x8}, {0x2, 0x9, 0x0, 0x2}]}) 18:56:14 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x3) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) open(&(0x7f0000000080)='.\x00', 0x42000, 0xb0) 18:56:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x210000, 0x0) 18:56:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) 18:56:15 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000340)}], 0x1}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80, 0x28844}], 0x2, 0x50) setfsgid(r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x59, 0x7d, 0x6, 0x147}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x48100, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:15 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)="f4f45abe8947997beb870fc7b380bb3432b23ca848acd946ba53a8e130f547b989afd01b3ce9b43032de92014d50a5bd8f32f07784f68509a809ce4d1d806f31a65bc00434420fb74d6bc3740b62561b560d5fff13b92c0151a9dfaa28fb2f4d46303bc104b23f23d7f8552705dce7c9246f6cc2d7ecd722b0ab7774dfc0590c7a32b03e521a261533ab075b83aef3bb031ec03cd56260c6ac8753223634fb2bbd4bf73b65f151902a530e59d2d4c546f9e326da765fb2d65d3129d364c37aff11de6384e0ece07a0228b5c18392a8efb0ea844cd922336b6be1898539f5b68d4928ac2f762c717e5595d8d2405df23b1ee14b1c7171bbf8607c972e01", 0xfd, 0xfffffffffffffffa) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cfa71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={'sha256-generic\x00'}}) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) r6 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cfa71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000000)={r5, r6, r4}, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={'sha256-generic\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r3, r6}, &(0x7f0000000200)=""/110, 0x6e, &(0x7f00000002c0)={&(0x7f0000000280)={'wp256-generic\x00'}, &(0x7f0000000340)="13d8e6787ba7c7d5d0399b14ff821842facbd7b5603daa1c961d60e52c304d5875301a730f7e0c033e13ab32c215670435a1c82d68c145c0f8ba2f1f710d9f19798852b72fddbf8d6b1e74ace14a20d1065ec593604ef0355c5de8f7272c3af1e9fcd3a2d30dd05090513b7fabe71c564ad8d7d4d3ec94825c0cece482c397a921dcd19c6516f5e7d9e7b42e88a92ab13df9a0", 0x93}) prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:15 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x6474e551, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40840, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0x4, 0x9, 0x2, 0x1}, {0x400, 0x3, 0xdd, 0xd8c5}]}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 18:56:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) [ 964.165708][T29566] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[29566] 18:56:16 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000000)={0xfd, 0x3}) 18:56:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) 18:56:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:16 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001540)) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3f, 0x181402) connect$rds(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:56:16 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0x1221, 0x2, 0x400, 0x6}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:17 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') clock_gettime(0x2, &(0x7f0000000000)) 18:56:17 executing program 1: mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:17 executing program 1: mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:17 executing program 1: mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:18 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x541e, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0xa4d4, 0x7, 0x400, 0x1ff, 0x8, "21ec3d24036ecb91"}) prctl$PR_GET_CHILD_SUBREAPER(0x25) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)='/dev/video36\x00') keyctl$clear(0x7, r1) add_key$fscrypt_provisioning(&(0x7f0000000040)='fscrypt-provisioning\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000000092caad1c0b1b9d83a10895456d328026f97bf631458ab04979243b7d71008eb5b79f1931b24eae6ba1d67b6a8c9377488cd4232eae270501474618db6fc0e7942f1b2cf202b04f047284644b3b10aa50142bfa4f4d5975451a88bd4512644e53e2c2ecb52c788e5cc48953095432a2f221a0b01d5a3ef01c3435f7cd9ac96d03f36447"], 0x8f, r1) 18:56:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) [ 966.305775][ T32] kauditd_printk_skb: 554 callbacks suppressed [ 966.305827][ T32] audit: type=1326 audit(1595271378.094:33479): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29626 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 966.415387][ T32] audit: type=1326 audit(1595271378.134:33480): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29626 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 966.437189][ T32] audit: type=1326 audit(1595271378.134:33481): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29626 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 966.458721][ T32] audit: type=1326 audit(1595271378.134:33482): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29626 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=310 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 966.480231][ T32] audit: type=1326 audit(1595271378.134:33483): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29626 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 966.501775][ T32] audit: type=1326 audit(1595271378.144:33484): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29626 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 966.523240][ T32] audit: type=1326 audit(1595271378.144:33485): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29626 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 966.544704][ T32] audit: type=1326 audit(1595271378.144:33486): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29626 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=2 compat=0 ip=0x415f51 code=0x7ffc0000 [ 966.566083][ T32] audit: type=1326 audit(1595271378.144:33487): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29626 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 966.587791][ T32] audit: type=1326 audit(1595271378.144:33488): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29626 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:18 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) 18:56:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="14b9d1c41b4bcd58f3db297c7859aa26122370b24bd9909f6d4f62a5a74e6cc72ba1f173aba9706055a16be6e77c222899c5797e3109daf07f6148df69cdf72a15dc22e6b22121d6b7ede02a2ac4286736c9e0c7e340174fde290d314435f744c952fc668be5cd61cf", 0x69, 0x7fff, &(0x7f0000000100)) 18:56:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:19 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x4, &(0x7f0000000000)=[{0x5, 0x0, 0xfe, 0x7ffc0001}, {0xfff9, 0xf, 0xff, 0x24}, {0x8, 0x9, 0x9, 0x3}, {0x8, 0x7f, 0x81}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:19 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0xffffffffffffff78, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x541e, 0x0) ioctl$TIOCNXCL(r0, 0x540d) 18:56:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:19 executing program 2: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x7fff, &(0x7f0000000100)) 18:56:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) 18:56:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 18:56:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') clock_gettime(0x2, &(0x7f0000000000)) 18:56:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') clock_gettime(0x2, &(0x7f0000000000)) 18:56:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') clock_gettime(0x2, &(0x7f0000000000)) 18:56:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') 18:56:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:22 executing program 0: chroot(&(0x7f0000000040)='./file0\x00') 18:56:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:22 executing program 0: chroot(&(0x7f0000000040)='./file0\x00') 18:56:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:22 executing program 0: chroot(&(0x7f0000000040)='./file0\x00') 18:56:22 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, &(0x7f0000000240)=r5) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000000)={r5, 0x5, 0x9}) r6 = semget$private(0x0, 0x8, 0x0) semop(r6, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) semctl$SEM_STAT(r6, 0x1, 0x12, &(0x7f0000000340)=""/153) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000200)=r5) 18:56:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) chroot(&(0x7f0000000040)='./file0\x00') [ 971.307198][ T32] kauditd_printk_skb: 226 callbacks suppressed [ 971.307251][ T32] audit: type=1326 audit(1595271383.085:33715): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 971.335038][ T32] audit: type=1326 audit(1595271383.095:33716): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 971.356565][ T32] audit: type=1326 audit(1595271383.095:33717): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 971.378196][ T32] audit: type=1326 audit(1595271383.145:33718): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 971.399639][ T32] audit: type=1326 audit(1595271383.145:33719): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=157 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:23 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) r6 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) chroot(&(0x7f0000000040)='./file0\x00') [ 971.761056][ T32] audit: type=1326 audit(1595271383.545:33720): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29741 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 971.832265][ T32] audit: type=1326 audit(1595271383.575:33721): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29741 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 971.854040][ T32] audit: type=1326 audit(1595271383.575:33722): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29741 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) chroot(&(0x7f0000000040)='./file0\x00') [ 972.123459][ T32] audit: type=1326 audit(1595271383.675:33723): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29741 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 972.145067][ T32] audit: type=1326 audit(1595271383.675:33724): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29741 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=3 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:24 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x7ffc0001}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x40000) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1, r1}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) chroot(&(0x7f0000000040)='./file0\x00') 18:56:24 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x5000, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) process_vm_readv(r1, 0x0, 0xfffffffffffffe40, 0x0, 0x0, 0x0) 18:56:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) chroot(&(0x7f0000000040)='./file0\x00') [ 972.871250][T29770] ptrace attach of "/root/syz-executor.2"[9209] was attempted by "/root/syz-executor.2"[29770] 18:56:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) mq_open(&(0x7f0000000000)=')\'\'#[$,\x00', 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:25 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffbfffd}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(0x0, 0x800, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(0x0, 0x0, 0x9, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x400}) 18:56:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_open(0x0, 0x0, 0x0, 0x0) 18:56:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, &(0x7f0000000240)=r5) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000000)={r5, 0x5, 0x9}) r6 = semget$private(0x0, 0x8, 0x0) semop(r6, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) semctl$SEM_STAT(r6, 0x1, 0x12, &(0x7f0000000340)=""/153) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000200)=r5) 18:56:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, &(0x7f0000000240)=r5) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000000)={r5, 0x5, 0x9}) r6 = semget$private(0x0, 0x8, 0x0) semop(r6, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) semctl$SEM_STAT(r6, 0x1, 0x12, &(0x7f0000000340)=""/153) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000200)=r5) 18:56:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, &(0x7f0000000240)=r5) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000000)={r5, 0x5, 0x9}) r6 = semget$private(0x0, 0x8, 0x0) semop(r6, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) semctl$SEM_STAT(r6, 0x1, 0x12, &(0x7f0000000340)=""/153) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000200)=r5) [ 976.317735][ T32] kauditd_printk_skb: 326 callbacks suppressed [ 976.317789][ T32] audit: type=1326 audit(1595271388.095:34051): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29833 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 976.451885][ T32] audit: type=1326 audit(1595271388.135:34052): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29833 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 976.473617][ T32] audit: type=1326 audit(1595271388.135:34053): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29833 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 976.495512][ T32] audit: type=1326 audit(1595271388.135:34054): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29833 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 976.517180][ T32] audit: type=1326 audit(1595271388.135:34055): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29833 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 976.538640][ T32] audit: type=1326 audit(1595271388.135:34056): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29833 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 976.560118][ T32] audit: type=1326 audit(1595271388.145:34057): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29833 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 976.581740][ T32] audit: type=1326 audit(1595271388.145:34058): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29833 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) chroot(&(0x7f0000000040)='./file0\x00') [ 976.603192][ T32] audit: type=1326 audit(1595271388.145:34059): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29833 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 976.624706][ T32] audit: type=1326 audit(1595271388.145:34060): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29833 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=2 compat=0 ip=0x415f51 code=0x7ffc0000 18:56:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, &(0x7f0000000240)=r4) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000000)={r4, 0x5, 0x9}) r5 = semget$private(0x0, 0x8, 0x0) semop(r5, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) semctl$SEM_STAT(r5, 0x1, 0x12, &(0x7f0000000340)=""/153) 18:56:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, &(0x7f0000000240)=r4) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000000)={r4, 0x5, 0x9}) r5 = semget$private(0x0, 0x8, 0x0) semop(r5, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) semctl$SEM_STAT(r5, 0x1, 0x12, &(0x7f0000000340)=""/153) 18:56:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, &(0x7f0000000240)=r4) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000000)={r4, 0x5, 0x9}) r5 = semget$private(0x0, 0x8, 0x0) semop(r5, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) chroot(&(0x7f0000000040)='./file0\x00') 18:56:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, &(0x7f0000000240)=r4) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000000)={r4, 0x5, 0x9}) semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, &(0x7f0000000240)=r4) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000000)={r4, 0x5, 0x9}) semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, &(0x7f0000000240)=r4) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000000)={r4, 0x5, 0x9}) semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) chroot(0x0) 18:56:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000014c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, &(0x7f0000000240)=r4) r5 = semget$private(0x0, 0x8, 0x0) semop(r5, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:30 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r6, &(0x7f0000000140), &(0x7f0000000200)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000240)={0x8, 0x1, 0x7, 0x101}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x6}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:31 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r6, &(0x7f0000000140), &(0x7f0000000200)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000240)={0x8, 0x1, 0x7, 0x101}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x6}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000014c0)) r4 = semget$private(0x0, 0x8, 0x0) semop(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:31 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r6, &(0x7f0000000140), &(0x7f0000000200)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000240)={0x8, 0x1, 0x7, 0x101}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x6}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='smaps\x00') r3 = semget$private(0x0, 0x8, 0x0) semop(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:31 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r6, &(0x7f0000000140), &(0x7f0000000200)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000240)={0x8, 0x1, 0x7, 0x101}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x6}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) r3 = semget$private(0x0, 0x8, 0x0) semop(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:32 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r6, &(0x7f0000000140), &(0x7f0000000200)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000240)={0x8, 0x1, 0x7, 0x101}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x6}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:32 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r6, &(0x7f0000000140), &(0x7f0000000200)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000240)={0x8, 0x1, 0x7, 0x101}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x6}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = semget$private(0x0, 0x8, 0x0) semop(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:32 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r6, &(0x7f0000000140), &(0x7f0000000200)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000240)={0x8, 0x1, 0x7, 0x101}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x6}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000000)=0x6) r3 = semget$private(0x0, 0x8, 0x0) semop(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:32 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r6, &(0x7f0000000140), &(0x7f0000000200)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000240)={0x8, 0x1, 0x7, 0x101}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = semget$private(0x0, 0x8, 0x0) semop(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:33 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r6, &(0x7f0000000140), &(0x7f0000000200)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) [ 981.349676][ T32] kauditd_printk_skb: 855 callbacks suppressed [ 981.349729][ T32] audit: type=1326 audit(1595271393.135:34916): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 981.488132][ T32] audit: type=1326 audit(1595271393.165:34917): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 981.510000][ T32] audit: type=1326 audit(1595271393.165:34918): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 981.531825][ T32] audit: type=1326 audit(1595271393.165:34919): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 981.553282][ T32] audit: type=1326 audit(1595271393.175:34920): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=3 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 981.574600][ T32] audit: type=1326 audit(1595271393.175:34921): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 981.596075][ T32] audit: type=1326 audit(1595271393.175:34922): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 981.617548][ T32] audit: type=1326 audit(1595271393.175:34923): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:56:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = semget$private(0x0, 0x8, 0x0) semop(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) [ 981.639112][ T32] audit: type=1326 audit(1595271393.175:34924): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 981.660490][ T32] audit: type=1326 audit(1595271393.175:34925): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=29940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:56:33 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockname$packet(r5, &(0x7f0000000140), &(0x7f0000000200)=0x14) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:33 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000080)={0xe, {0x3, 0x1, 0x1f, 0x16, "c14c202ff9ef18369acd1acaff22a867fdc881fe408d"}}, 0x22) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) bind(r0, &(0x7f0000000100)=@can, 0x80) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:34 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) creat(&(0x7f0000000280)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:35 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:36 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:36 executing program 1: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:36 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:36 executing program 1: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:36 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:36 executing program 1: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) [ 989.240328][ T32] kauditd_printk_skb: 351 callbacks suppressed [ 989.240385][ T32] audit: type=1326 audit(1595271401.026:35277): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30125 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 18:56:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) [ 989.416231][ T32] audit: type=1326 audit(1595271401.196:35278): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30132 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 18:56:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) [ 990.171957][ T32] audit: type=1326 audit(1595271401.956:35279): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30135 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 18:56:42 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x840, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000240)={r6, 0x150d8536}, &(0x7f0000000340)=0x8) truncate(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000080)={0x7, 0x0, 0x2, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000000c0)={0x2, r7}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) [ 990.451751][ T32] audit: type=1326 audit(1595271402.236:35280): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30141 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 18:56:42 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000140)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000100)=0xe0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x2, 0x280201) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0x101, 0x7, 0x8000, 0x7ff]}) [ 990.730774][ T32] audit: type=1326 audit(1595271402.516:35281): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30149 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 990.752586][ T32] audit: type=1326 audit(1595271402.516:35282): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30149 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 990.774270][ T32] audit: type=1326 audit(1595271402.516:35283): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30149 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 990.795757][ T32] audit: type=1326 audit(1595271402.516:35284): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30149 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=85 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 990.817250][ T32] audit: type=1326 audit(1595271402.516:35285): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30149 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 990.838756][ T32] audit: type=1326 audit(1595271402.516:35286): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30149 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:43 executing program 3: r0 = socket(0x2, 0x6, 0x80000) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipx\x00') getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) pause() openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x501200, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000180)=0x5, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x111) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000000)={0xfffffffffffff07c, 0x0, 0x2, 0x1}) 18:56:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) 18:56:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) r0 = socket(0x1, 0xa, 0x90) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x40, 0x2}, 0x10) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) 18:56:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x680000, 0x4) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x6, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0xa}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x840}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x6, &(0x7f0000000000)=[{0x8, 0x0, 0x0, 0x7ffc0001}, {0x4, 0x9, 0x40, 0xcd}, {0x1c00, 0x1f, 0x81}, {0x6, 0xf1, 0x3}, {0x86b, 0x5, 0x0, 0xfffffff8}, {0x8, 0x6, 0x4}]}) 18:56:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$IPSET_CMD_DEL(r1, 0x0, 0x4084) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000000)={{0x0, 0x3, 0x0, 0x1, 0x80000001}, 0x7, 0xfffffffffffffff8}) 18:56:44 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x20000000000000fa, &(0x7f00000000c0)=[{0x6, 0x90, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000000)={r3, @in={{0x2, 0x4e24, @rand_addr=0x64010102}}, 0x1, 0x8}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={r4, 0xbc, &(0x7f0000000340)=[@in6={0xa, 0x4e23, 0x6, @private2={0xfc, 0x2, [], 0x1}, 0x1}, @in6={0xa, 0x4e24, 0xc7de, @mcast2, 0x7ff}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e24, 0x7, @loopback, 0xf3}, @in={0x2, 0x4e21, @private=0xa010101}, @in6={0xa, 0x4e21, 0xf754, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, @in={0x2, 0x4e21, @private=0xa010102}, @in6={0xa, 0x4e21, 0x2, @local, 0xfff}]}, &(0x7f0000000280)=0x10) 18:56:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x0, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) semget$private(0x0, 0x8, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) semget$private(0x0, 0x8, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) semget$private(0x0, 0x8, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x3400}], 0x1) 18:56:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, 0x0, 0x0) 18:56:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20400, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000000)={0x9, 0x0, 0x10000, 0x1000}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000040)={r5, 0x3f}) 18:56:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, 0x0, 0x0) [ 994.248546][ T32] kauditd_printk_skb: 241 callbacks suppressed [ 994.248608][ T32] audit: type=1326 audit(1595271406.036:35528): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30228 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 994.401844][ T32] audit: type=1326 audit(1595271406.066:35529): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30228 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 994.423825][ T32] audit: type=1326 audit(1595271406.066:35530): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30228 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 994.445234][ T32] audit: type=1326 audit(1595271406.066:35531): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30228 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 994.466617][ T32] audit: type=1326 audit(1595271406.066:35532): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30228 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 994.488119][ T32] audit: type=1326 audit(1595271406.066:35533): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30228 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 994.509737][ T32] audit: type=1326 audit(1595271406.066:35534): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30228 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 994.531176][ T32] audit: type=1326 audit(1595271406.066:35535): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30228 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 994.552562][ T32] audit: type=1326 audit(1595271406.066:35536): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30228 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 994.574155][ T32] audit: type=1326 audit(1595271406.066:35537): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30228 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, 0x0, 0x0) 18:56:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040), 0x0) 18:56:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040), 0x0) 18:56:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x3be3b09562621ac3) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r4, 0x201, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x34, r4, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000203000073000000000000000100faff180001000100001200030d809225196c3baeeee740000000000800054000000008080001000100001f08000540000000329efd03400000000400"], 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x1) 18:56:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040), 0x0) 18:56:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000040)=[{}], 0x1) 18:56:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="df280000", @ANYRES16=r2, @ANYBLOB="0100000000000000000001000000000000000c410000000c001473797a3000000000"], 0x28}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x1c, r2, 0x100, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}}, 0x4002041) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x4, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x14, 0x19, {0x9fb3, 0xfffffff8, 0x952a, 0x7ff}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 18:56:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000040)) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0xfffffffffffffff9, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)=']!-&[)$!\x00') 18:56:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x2, &(0x7f0000000000)=[{0x3ca, 0x0, 0x6, 0x9}, {0xfff9, 0x1, 0x3}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x2, 0x880, 0x8, 0xfffffffb, 0x7f78}, 0x14) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = socket(0x2, 0x80805, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) sendmmsg$inet(r3, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r3, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000140)={r6, 0xcc, "210657516082ffb68ed299d92cee807fe57228c12249a2a5897b396006d955a7476d07ba566bc2c813227468b8101595f28c253433cfe40c2b7e4b32f60816ecbf3012ad3124ecb027fd45502a190f0b5572280ba8697421d9ac3f525de81ca63032a5a3031d51a892a40bd4136a61f03e13d05d8547dcdb9d5cef109428f16203a6bdb12f901ec5caf4315ff5ee4cbaf48c8eacaf0c674b1a902e9aacfd2da13cf70ad0052f11cc36a6fead95110b5704da3010f22d54294ec754fd29cb515f3da0409f30f937472d71a114"}, &(0x7f0000000080)=0xd4) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x400, 0x4) 18:56:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$IPSET_CMD_DEL(r0, 0x0, 0x4040081) 18:56:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) semget(0x3, 0x1, 0x18) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f0000000200)={0xffff0000, 0x80, 0x2, 0x5, 0x7fffffff, 0x10000}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) rt_sigpending(&(0x7f0000000140), 0x8) sendmmsg$inet6(r6, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000002900f8ff08000000000200e6a52f3046a75c9851f06aaa0eef57e900"], 0x18}}], 0x1, 0x4048880) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000080)={0x990000, 0x0, 0x10001, r6, 0x0, &(0x7f0000000040)={0x9a091f, 0x8, [], @p_u8=&(0x7f0000000000)=0x4}}) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4}, 0xc) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r7, 0xc00c642e, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000002c0)={r8}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x541e, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbf1) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x4000000) 18:56:50 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 18:56:50 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xc0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x8}, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0xfffffffa, r3}, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x10, &(0x7f0000000100)={&(0x7f0000000000)=""/134, 0x86, r3}}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r4, 0xf505, 0x0) inotify_init1(0x0) 18:56:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = dup2(r0, 0xffffffffffffffff) mq_notify(r1, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) shmget(0x1, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) inotify_init1(0x0) 18:56:51 executing program 2: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x6, 0x601000) ioctl$SIOCGETLINKNAME(r3, 0x89e0, &(0x7f0000000440)={0x3, 0x2}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r5, 0x201, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x54, r5, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xb8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xf1}]}, 0x54}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000000) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000040)={0x9e0000, 0x9, 0x67e, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x990af6, 0x0, [], @value64=0x2}}) ioctl$VIDIOC_DQBUF(r6, 0xc0585611, &(0x7f0000000080)={0x402, 0x9, 0x4, 0x800, 0x100, {0x77359400}, {0x4, 0x2, 0x3, 0x20, 0x9, 0xd6, "b2aafd56"}, 0x7f, 0x1, @userptr=0x2, 0x4004}) 18:56:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$netlink(0x10, 0x3, 0x6) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0xf4, r2, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0xbc0f72f154be835f, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}, @IPVS_SVC_ATTR_SCHED_NAME={0x0, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x239}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x62}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x14}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x400}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv_slave_1\x00'}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7ff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1c}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x800}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40000000}, 0x80) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmmsg$alg(r3, &(0x7f0000001740)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="f2dd56bc7b7afd1483683052a7c27ed5fed36068c2a8b6a0b7c161e81f743db05dcfbbb1ed0bef9c072d5a86f3d2c82adb249463307de21ce43faa361814db75e3da9b2c452248b54d21229a638aef370a142cf215f2a9b68ef70caa6134f4a08d572d541b9cff3a10ea18b0053e2fc7c79a903333bbb74754813a812de2e446d46f0c3c7916c4964940d2c165c5cf0d9889329c7b22f80ada1c25affbb1cb8c866fc947e2225d83f3e42e219f5338ab940b56dec2e5a5948de23ee595a820793dfd2b7344d51c23959ac8e84113ffde7256952fc753e6a8d8ddc8a67642df10901da230a0c388befcaf7e00", 0xec}, {&(0x7f0000000200)="d7fc53ad4f01e0e93601e5f1ca8fcd3ede42b74e8c04a5e884558105e460897d6d8b1921eecd93949589ab7316a412ff0e83c412a9122275b18de2b9599f84612ddef047", 0x44}, {&(0x7f0000000500)="eee965661c970608733d4c1161381915b1ecb185809e494ab5c643dad9ef31ad15cce433b02dc8e8687ea9d7081f96dbce4a7a7b92bf0474ee175a66143c61a54414cd8a5ce7bc3a188d9604c81999bc6656172d38f4a5f30c", 0x59}, {&(0x7f0000000580)="8e3fe87b2b52e8880ca43d964e86aa7ec29029fb5b518519c07ced2e129398b31403c5315bc5ef2b47ffe8baf78e70b9e256b5299bd5a760e6d48e915bbadd0de8e28b464585e93d097587ddcbde1914e25bd59f9af9b8cd03e48493ce17c7e9064ef25831e7e132d2fff1a43c33828b6369b0d0acbf0a52db83d1d07617233ad84512b7323e8329add7926a1346bba00073dae0", 0x94}, {&(0x7f0000000640)="7d34ee965a3392cb0ff7e95101b291165815b26ac15ff7d5e16ce8f8dd0ebdc342baec368237531fa4b15bdf73f6a11572f0117e8137a8a39996556a2ec29834158557ef46be67520a40cbc74c7b850cdb64b23442244be71518024850414c4228114fb98565f3b12b68f9977bd94a95c16451088169f0f81bc0d462303178740b22702f2dcd589bd671d882d2b1ea4992c322b0e2cfa0ebc507309fc46c6cb007dc4d", 0xa3}, {&(0x7f0000000700)="be2801ed16126d70ef56e1e213b773d83029e94961f950dc8fc5bbff6f3a56eb64684cb15e7ecdaa7415dd7dff95502054879131e97150dc25cc105372522a4fd03fd969254e56643aa14937712bf14ab3144ead1d1b2edac7d94b12eeeb9148869c51d0c7c7c0897cf66c23aa30766bc4b06e3f98acdabfaf409558831faf995c", 0x81}], 0x6, &(0x7f0000000840)=[@assoc={0x18, 0x117, 0x4, 0x7fffffff}, @assoc={0x18, 0x117, 0x4, 0x4}, @assoc={0x18, 0x117, 0x4, 0x400}, @assoc={0x18, 0x117, 0x4, 0xf092}], 0x60, 0x44}, {0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f00000008c0)="52ed3cfe0968c63504369570033b2e98c55c363aa7b25fbf18582cc2b1051363820e48688acf1660ae9cbe48adcad10bf28277fd16ac2439eb5997ab7730a4f507b3501d2c66db51c8969efa2907ff0268d5e4d93af60cee988856a518c3f11a86d278c4881d8fd58807c39158c5b82932dd25a2c517d1603d0689dd95e32bddda59da1f2f8dd6596a2ea8e3b8089c94f61bcc16cc50130f3c2c49b8c08a212f1f4ee92b0c9b871dc60286ab28c0fc31396360b4", 0xb4}, {&(0x7f0000000980)="c09accb670629a7fada56761ba4149fa51a83eff8e33aeb7bd32f1dec1a1e113944a285be31be7adece03e76a01f627e37dd1b308c83b4e3b3436c32067b75d0f3e8baae42aa63c13862448b1767c97896c2849d822051234d0553a0cd14617d789fc6968d45e5a81791a36bf4feea6d4bf69a8f7fe156b66e42f504e97efcbf27df2fd366eb4661267520440f312b317b283217fffe81706fbc542fd62908cb8d860bbbe9e13f20024bb917301c62085ca81ded4a57432bebb102abc3594981e0de0971b48973858c8b620e9e17d03a428f6ad4e1796c540360ad0bc569c151f90a", 0xe2}, {&(0x7f0000000a80)="ce7e0fcc33bb8739c6d32d614d54ae08e1c17737428cbfd982ee7d9bd439dab6d5120a5e2a8940ef797f0552fbf0b81ad9af4cdd2b7311d5d01fc6f9e7f85e5315c4dfa02e83cd038d", 0x49}, {&(0x7f0000000b00)="e774782c22f451d33a37a2b0416899ef63cf66e3a0d16200ce7246fadfc687bfdf7a0234defb3489ff23cd070dd4ed23c739f061338e90bbfae0134f0eaaba01974f5ff3d7c81516e072b77b97b2f6b7056bfa098a4f886b6f0aee500c9a520fc2db1d9628b0cfc50e74e48f54d9565be61887592a6335c35df952383eef3dcfc41c7bbf25", 0x85}, {&(0x7f0000000bc0)="5e82f3bfe37b2220b4d4e09f506ba7aef9fa6b369270aa2f7d9c511e7e5a7f780e0360244a3b09269b27164b121d615bb6b1ca382b44131a90a9472650ce8178a11895c12fd3c2c5eaa4f9c7ccd2dcfe09ba5147f612c305a398cb327b8d3b3c3b4f2c05074ae0425884ce4dfe048c263705934163a67931278fdc175bb159d6bbfb999954a1c170b2312c38b6432470222462af4bc9855ff2e97a8ea49d029b642f260b00c186218b95eb65cf5ea8d9f160de0f5007269561c6c7240fea4bc3add8a2b430213f0529f3327bdb85b4f6545613d6dd16ead4d335f77dbd6e03ccd8a21069c5", 0xe5}, {&(0x7f0000000280)="ca711dc8f9e9e9310a998c4c59cd6f19e0839ba7aa4eb03b17fdc7679abc68dd955ba9c1a4ce266889c976f1a950c718ba4354c1f606d9e9a4fee4", 0x3b}], 0x6, &(0x7f0000000d40)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x10001}, @iv={0xb0, 0x117, 0x2, 0x99, "254b93286570d0cc31b948b12438306ae3d7ef510bf8bd8e01b57eaa9177f3a20f144c54a6011ac79f49ed43d6428d6fac2c6548b95208edd343cafc02b5a0837e24d9ab966b7e8d9243345f6d81030fc461390efa2e7b66fde1fde59dc9655999cda04fa0aefc2d25a41fa08a0614811243b0c4141b3bd44d0336ae2e17010d8ec01adde8ef8b7a467bdb2f6665a72679a11f55702c58ef2d"}], 0x128, 0x4}, {0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000e80)="4f206fd23e1e9df0304d9c6cb5cda6fcc42d73e855d8a19a2146f03652d1e5ce353b0aab1b2a4cd51154bd002cf44e8089bae407db41440ea4a007cc84b54cdf117e7248f4924ef18386625a647de62bee34a58f697de3676ba6d79d4bdf0b51770246ea17021ec6e47dc696b5a00bb8383d562f4e25782b2c4758e53ec3773fbcb2a6b7886cec111b3ba7703f6133cbaf267929caff6e38", 0x98}, {&(0x7f0000000f40)="2897c27778651baebf9e9e7bf64016cf302cc54b297a17e320a5270564332f46edb3be2805e0d62c85214e29f3f761cf08f265001cdddcea377c51aa27ea6b496c06e191aec9a14273dae0449a55a748289d6ad8758f41c54675df152fd127d65a57a6dad698949c", 0x68}], 0x2, 0x0, 0x0, 0x20000001}, {0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001000)="bcd30265299db1b66f2802a132755a6d07644933e7f2a147db52fd1af5f5b981feb783bddf7df75159e7f35f6f2a053eb1395eee1822248e74db027b330a4d154a4aeb04fc14ce11c12ccb8245e015d766af", 0x52}, {&(0x7f0000001080)}, {&(0x7f00000010c0)="bfb821e686b69f283e5de8df69b8834c5b5bf25e61b0875fa6dff9c516217bf360132893856d46969c4ab56c561f63b3c506c0429f98ab301a127cdd90bdb43613c1dbbdd744fbf3395ea52692bbed12aff47cbfeeb09a4ae415d9edd8299c63992ac5a31034fd9e642d3b9ff9ba6bea03df1d3fb9a61ef7a389816a94806a78daf5986c294b01d28e15b6a5dc474ff52bc64d76166fe10dce578aaa3f82b1d5369bbb91b4d40414fa9a5c1276431c841e71c5d86e686c327fe1782205b4a4c638826bb3654691964154677fe21509a3546a1317f7dee444fb45", 0xda}, {&(0x7f00000011c0)="45e39f77d38913b4df565e2edf306543579a2adc18141b14822abde7896988f42c616b7e77f9717e090e88c0bb88ca8fea822511118907b5bcf1aad3598834b57b0d404c875041dfeb6b6b6781203ed3bbc183c0e4c8757297ebb9df90dd045edaa5c60d2a83a76d8ecc51c0838f5f44fb648cd45ea0e70f4e4741dd5161c4ed7639b3a96595877827eef07a333a51190571f548d8ee3ce2cde6a455ec9927b114f6125a4241510a69cd97216d88efa21361d2a171b810e48f67af912db3329b1c5d1f25578b989f9086c52d747f8f0e72b2f8c2ea5ae49695aa30991ce885066ea4ec8d10d6c5f44b455669fc", 0xed}, {&(0x7f00000012c0)="f01fed323f63fd622fe7d30a1b34ac1a37bd51cbf2d5ec8c861faa8b7124478fbf6dbaf9cf7a63e94d74f2d94370d6b8621b71221436dcd94ad4e691e9ef9326a6e3d19381182ce7d9", 0x49}, {&(0x7f0000001340)="09ef6fbc31325e780e2c7ffc6f3ef061571767b2accc672840e6c06be52a1ca5c5703960f74a365ec260fb80c0ac3503ca95d9192ceb67f3d9adc88882663301e979599c79d62344f545279dae77859fc531ca7c70c2940f9cc4f638ff8694d073f8517395f9d109716c73a9286383ee0b59ef4715c8bc181b85e0e9b69ae7aa9d4b19ad574a74937c2f8f55df82a10e375446ed892f0d13a1177a493adb6bda066158b8abd64b22878d6a1894330e5ed4bce23f7158a7ccaa4f906c1243e8e0eb67c8a3b469fae3cbab8d48630176e8c1c110f46a2ce8181968eb5b6e93ee02151b64ca4094a455b5602f37", 0xec}], 0x6, 0x0, 0x0, 0x24040011}, {0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000014c0)="5489d185c6d487c88c25235de1b3393594b705ad954c443ab1549aa0c14359fcd52ab490fa22264e73de757eab7d94bf6d528a057b986adeed4b2bd2960b26ee89b308441e9fe735cefcfbe48f584bdf27fae6468ab10f1b5fdda4e2a36bed16f1b1cc0c3518b9b6d1e7df", 0x6b}, {&(0x7f0000001540)="4213cb10b7c9ecdbd6e69cc3f36fb6075a6b3afd901512e31ed334643ede9d2060f26ffb41bc263cd973a92990a1372b569e15587a5d2aa11e2410c37038ff3889fbf7fc6df63584b3ea0dfc5af939aa645668db0adc04860a6c9bdc8f1caf1393a39cf35c2d52895240a4b1087ce233c16282a42ad67c39578eb09af7c4e21efb8b75ba5b54bec1744ab8ade1f08b9ce651fb2c56e568b79f5bb6fb97ae5a4b7ad39f01a3084217a0799d78b2aa7d8c3fab59db47c51a504513b5143ee714b41c9c6cabe216ab6c443b8450b7bf53920e7dae007831e84c2becf719330548acf830", 0xe2}], 0x2, &(0x7f0000001680)=[@iv={0x90, 0x117, 0x2, 0x7c, "18f6614ef96a227fbaa3f78fad9313f1d950022049890cc010b2872a12c3576b777c17cd679fb7cbe50da9a529e4b553ceaf93644b76d6e90843e593990aeb352814195b02ed5622bf26243a78b27fbb4b75379f628f28ccfbc99667cc1056fbaa8f90846d999b82279555e74382bef29dcf6feee61094215401a282"}], 0x90, 0x200000c0}], 0x5, 0x4804) 18:56:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r3, 0x0, 0x15, 0x0, &(0x7f0000000040)) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r4 = dup3(r1, r2, 0x0) dup2(r0, r4) inotify_init1(0x0) [ 999.494160][ T32] kauditd_printk_skb: 684 callbacks suppressed [ 999.494216][ T32] audit: type=1326 audit(1595271411.276:36222): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30342 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 999.522469][ T32] audit: type=1326 audit(1595271411.276:36223): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30342 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 999.544039][ T32] audit: type=1326 audit(1595271411.276:36224): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30342 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 999.565639][ T32] audit: type=1326 audit(1595271411.286:36225): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30342 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 999.587168][ T32] audit: type=1326 audit(1595271411.286:36226): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30342 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 999.608665][ T32] audit: type=1326 audit(1595271411.286:36227): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30342 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 999.630120][ T32] audit: type=1326 audit(1595271411.286:36228): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30342 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 999.651592][ T32] audit: type=1326 audit(1595271411.286:36229): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30342 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 999.673257][ T32] audit: type=1326 audit(1595271411.286:36230): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30342 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 999.694742][ T32] audit: type=1326 audit(1595271411.286:36231): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30342 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:51 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0xb, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0xc1, 0x1, 0x6, 0x8, 0x2, 0x0, 0x7, 0x20c, 0x38, 0x55, 0x1, 0x1ff, 0x20, 0x1, 0x6, 0x3, 0x7fff}, [{0x7, 0x0, 0x1ff, 0x921, 0x1, 0x6, 0x3, 0x8}, {0x5, 0x822, 0x894, 0x8, 0x3, 0x0, 0x142}], "", [[], [], [], [], [], [], [], [], []]}, 0x978) r3 = open(&(0x7f0000000d00)='./file0\x00', 0x50403, 0x190) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x48}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@rand_addr=0x64010100, @in=@private=0xa010101, 0x4e23, 0x2, 0x4e22, 0x4, 0x2, 0x80, 0x80, 0x2f, r6, r1}, {0x80000000, 0x7ff, 0x8, 0x1ff, 0x1, 0x5, 0x2}, {0x1f, 0x8001, 0x1, 0x200}, 0x10001, 0x0, 0x1, 0x1, 0x3, 0x1}, {{@in6=@private1={0xfc, 0x1, [], 0x1}, 0x4d2, 0x33}, 0x2, @in=@multicast1, 0x34ff, 0x4, 0x1, 0x7f, 0x8, 0x5, 0x5}}, 0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80, [], 0x25}, @in=@broadcast, 0x4e22, 0x1, 0x4e20, 0x0, 0x2, 0x0, 0x20, 0x84, 0x0, r1}, {0xb0a, 0x9, 0x80000000, 0xffffffffffff5182, 0x6, 0x17e, 0x7, 0x9}, {0x1ff, 0x3, 0xf87, 0x1}, 0x9, 0x6e6bbb, 0x2, 0x1, 0x0, 0x1}, {{@in=@local, 0x4d4}, 0xa, @in6=@ipv4={[], [], @private=0xa010102}, 0x3503, 0x0, 0x2, 0x2, 0x40, 0x4f6, 0xd38}}, 0xe8) r7 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@initdev, @in=@local}}, {{@in6=@local}, 0x0, @in=@private}}, &(0x7f0000000080)=0xe8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {&(0x7f0000000340), r4, 0x5}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000000)={0xc, 0x6, 0x4}) 18:56:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x2, 0x5, 0x0, 0x7ffc0001}, {0x1, 0x20, 0x8}]}) chroot(&(0x7f0000000040)='./file0\x00') sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:52 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x3}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/ip_mr_cache\x00') ioctl$TIOCSIG(r2, 0x40045436, 0x39) inotify_init1(0x0) [ 1000.799534][T30384] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[30384] 18:56:52 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) 18:56:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0801}]}) inotify_init1(0x0) 18:56:53 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000000)={0x0, 0x10, [0x100, 0x0, 0xff, 0x6d5c]}) 18:56:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x16, 0x4, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:56:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) r1 = socket(0xa, 0x803, 0x9) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) 18:56:53 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)='/dev/video36\x00') keyctl$clear(0x7, r0) add_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="8f7e1ddf05e0479975d4b1c020b5ff59ca455c120283f64d09821ea790003d69057afff2461a3dccca0f0009e9b8aaea62ad510a246de246ed99436909161533ac995a634db42dc93a3b67554d60be20362f104c5e535d632dee9f9d8bdba85b325c41f176a5afd8660462699899439f835460fda5909fd0383da410bad09a1da698037b726cb574a2eddbbc5428709826143103a1b25a0d1d00ea60d0add5a84e8d448764655db1162204709ff38d753cafe4835ce44a8055e55f4a2fcf9f5f8cb0d22905b217a6a4432fd783158312abdfb128ab4e9a435bc2c99b7fd2c13d2b8fdd08", 0xe4, r0) r1 = socket(0x1, 0x803, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$apparmor_current(r2, &(0x7f0000000280)=@hat={'changehat ', 0x3, 0x5e, ['id_legacy\x00']}, 0x27) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f00000000c0)=')-+\']&).^\x00', 0xa) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000000), &(0x7f0000000040)=0x4) 18:56:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000000)) 18:56:53 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r3, 0x0, 0x15, 0x0, &(0x7f0000000040)) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r4 = dup3(r1, r2, 0x0) dup2(r0, r4) inotify_init1(0x0) 18:56:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x80000000}]}) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000040)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8800, 0x0) sendmsg$IPSET_CMD_DEL(r0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDCTL_DSP_SETTRIGGER(r1, 0x40045010, &(0x7f0000000080)=0xfb8) 18:56:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) read$char_raw(r0, &(0x7f0000000400)={""/38117}, 0x9600) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:54 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r3, 0x0, 0x15, 0x0, &(0x7f0000000040)) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r4 = dup3(r1, r2, 0x0) dup2(r0, r4) inotify_init1(0x0) 18:56:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x2, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = inotify_init1(0x0) write$binfmt_elf32(r1, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r3 = inotify_init1(0x0) write$binfmt_elf32(r3, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x202, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r4, 0x7, r0, &(0x7f0000000100)={r5, r0, 0x6}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r7}}, 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}) inotify_init1(0x0) [ 1002.786409][T30441] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[30441] [ 1002.846683][T30441] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[30441] 18:56:54 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r3, 0x0, 0x15, 0x0, &(0x7f0000000040)) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r4 = dup3(r1, r2, 0x0) dup2(r0, r4) inotify_init1(0x0) [ 1002.940699][T30445] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[30445] 18:56:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = inotify_init1(0x0) write(r0, &(0x7f0000000000)="f644c9f54c3b9737e56b200b8162f4ec4871869ab388a5c4fd593153294c4b6ba8c1ab635080e8807639aae4ff56ad327ed5f24fa9d009472c65e07656901c9b97088fee533dc3348c9b19b3ef723db95cb2606bc01d11", 0x57) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r2, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x200, 0x0) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r8}}, 0xc) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r5, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f0000000200), r8, 0x1}}, 0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r4, 0x2}, 0x8) 18:56:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r3, 0x0, 0x15, 0x0, &(0x7f0000000040)) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r4 = dup3(r1, r2, 0x0) dup2(r0, r4) 18:56:55 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x4600, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x375) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000140)='fuseblk\x00', 0x2a0800, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}], [{@measure='measure'}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/audio\x00'}}, {@appraise='appraise'}, {@context={'context', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x3b}}]}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0x0, 0x0}) sendmmsg(r3, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x1, './file0/file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000000)}}], 0x1, 0x0) r4 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r5, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000540)="fdc0c193f6", 0x5}], 0x1, 0x0, 0x0, 0x200008d5}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000003000000000000271e6e8d43b200bbe49f00242d05ab0acd5913c91d27d7083ba34d960f2ac73e37b97512f2c6f7f9a4d0a73a8be2bf94a1bb5e1166571e98e0bee069023834140d69b5ce764174ed85cb71a26319dd0b22da6e33463aa6e7998826a09db2ab739a5778b662695a8684682de81bc1282151ae4ffae9b355d558af60", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002400038f2458eccc9377000001009ece6754cd9569e52eb3bee2000d8f200000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xa8, 0x4000}], 0x2, 0x0) fchown(r3, 0x0, r7) fchown(r1, r2, r7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000340)}], 0x1}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r8}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80, 0x28844}], 0x2, 0x50) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004180)=[{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000100)="863f462617e51f298487b8623e3fcf6ee4eae4234e985cdfa7eb862a089c626e0097df7a101a31e1ef4c52b4806e9bea84d0dd4be5507cf70fa31a879ad518181c4a194f95dbbf28cff3d529c7e6aa2b4cff0dacbf8d073faa5632168380c704dbc40a6937e816fcb80ce5c46f771543ed3a4f03", 0x74}], 0x1, &(0x7f0000000280)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60, 0x14810}, {&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001740)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="917a7cefc8dc11161149e2b073b6f5dc61f66fca182589401134d1551396f708bfd5ec74e585a26ef41bcc3a74dab736f16bc00b2407da933938742bb5044115aa135486462dd50a5d51b42bcb6dc28598e313ddd65012fd12d05b217f5292724ff528b45d574ed2cb8928e01dea3e95b87dbc9ea18c59359038c3b2", 0x7c}, {&(0x7f0000001440)="070bf60f41c3931bbbbead8c41a3963db3e61b30400c9de7d75749db8149f23ebe4e5bda7ea8dab53bb79aadbbf73e9aa3a331b06afdd6774fb038accc6096ec159eb4b3ccbe8c94e278a9b1cb3d9396ac0fd72566e453db723008dc5ca81cd8604df2af7621b55b4f0f5c2f6a65f0fa3f65dc80c3fe2256fefb5edca09f081304c86df02856adf652e3184b65e424d49d0bfc869e0dc1854f3cbe7ab0e5d9f42af80a5eb7", 0xa5}, {&(0x7f0000001500)="ec9d0ba347969d45dfd75c9e3df183fb9ad07fcd8eb33fc7aded8f194bb7b4dfb1136a5a01c1d6809d62cdf730055e387d9e82348defbad083d54c3c54eb716be8f0bba4da453a32710680b1eb4a863ed50bb0eafd1f8eb61116163a9a89970f89f919fd263d82bf42bae8a0b7b43e3f184905feff7265a3e66dc975b9f367094508d5412c7b3bf42424730727df72d9dbc83d8a22d236fdacb9751caa2dd891977a3be496", 0xa5}, {&(0x7f00000015c0)="43fa7049188531a9056472fefa8507627658b5bd5fb3d7fbddb6e2e207c341fb3ed330b1660978f47a2c991fda8d515ecb6dc599873a411aa82025f998f70f6496f6022408f779be9146a956d18c3c6a97849b5ca8b35e9626598e50fd3d5fdd71e4c24e8f2e7cdfbf18f3", 0x6b}, {&(0x7f0000001640)="719361fc6ae1a7b1c5b2ff456878fa713b49214c2866c9b9791386d1e2d1ebb30f521217dfbcc00d177549c68032a744e596327a4416557a74b17c1dc110b8713c42f247f2f49670ecf532f0d8eb5fd7d6c4a87cd7215fa1632b49c26d44b32a7e976a550f6ee6e48a499d69fd30ca6d35ea3bc980a74b0905641b1663f7c17e0ead441a4d28647f2e45a465f01da80c11cbb52a7513be37870d22d03eed5b262941773909b10caba0ec67b3f0b3a290c2ba499288f5cafd9aae532792632bfa02", 0xc1}], 0x6, &(0x7f0000001800)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8, 0x40001}, {&(0x7f00000018c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001940)="e909358c86ae1173cd065de4455491fcfb546451a8", 0x15}, {&(0x7f0000001980)="10edd5b2a084b40ecab40ac427e0065745512a240db1e5980bbbf8fb4c1d49cd69993df0cbb1bbbd8bf61a52421c2ac7cd68c82e506fb9dd9ceda4ea67f126a5616a03a2aa64a4367977c8ff8f146dc5d6599ae5791fdfca471d308f1817cf95777d2090f6cb99850bcc8369c76eca44a5c7044c6758d8907e9c0cde76733772097f953b", 0x84}, {&(0x7f0000001a40)="58359d728ed8c50f62fe7d96c07de64ab4c9ce3ef3f8a06d092db2071b7489fd3f933ab8af39b15e7222d866f47cb8028cbb31bef11224a02f74ad745b87fe5fd4aa645233f9d13484e5f703b1204e3b4dc29368204ee6d8e789482116e212062f22fedb04824a58a3405e1fea3d08f386e27fd535af772e513df81d3c254605fe321e17216cd6fce035bfe4d3822b0921009238851ed84c62e5202f4c39dde4bf56b840894198b370849494d1749fc8b7d92d10e2f6108d4d080d9f12b2cd4218e200e50f2776d1bde6a30589a197169a6fc2acc8723626befcfd9054ca4919abeac6ccf719db1c04884933a7fe231c", 0xf0}, {&(0x7f0000001b40)="483547336064a3155a067706547d7dd9276840cd82a2238fa85146f8cb27bdcc1a176a8f7d937da3eab9e52798f4fdf08ce0d9095b983b45fdc3f2d81248aa311fe9672428c84ea8e4981d669926947bfe", 0x51}], 0x4, &(0x7f0000001d80)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90, 0xc0}, {&(0x7f0000001e40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000001ec0)="da7c091407b77df429059ef9b481cd9f00146c0cc5ce6861a3bd5384006355e3a1e2aa897c5f616c043707200d45f76e61749a", 0x33}], 0x1, &(0x7f0000002040)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8, 0x8800}, {&(0x7f0000002100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000032c0)=[{&(0x7f0000002180)="35134110abd7fdd42b4686513675a259cbb2eda76335abe35e95fc8d7ef59de71122d06c5f935b96214e54309daeb081b3ad5270afd380872a2b7ca0767e12ddd6b4eb0cdf703e07f3573cbbb3f425be307e1e8256d59fa0201b705ef68832a7fee6ca09bcf54b72243b92990ade59ae8b79fd4621699698d528dd52c53b4fe3630385c19ecbce8bf3c6ec2871d47a324e5da599611953ad9d7ee63b0f95", 0x9e}, {&(0x7f0000002240)="ead9855523445a75336ab69347bce34e151410c41347a8d20a72396ef91a91d6fff801e3a2c98c1b95c7ac0306ebbb4908d78e44ee4d21366b5d51e772e752b15947fdcb3d59e66592f49075c2b4179f5dd6c6b7c1d3514d6cab58a2594ae7b61738f4aa3babe2cb5a34be3a5a5164bca35ed22e6c", 0x75}, {&(0x7f00000022c0)="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", 0x1000}], 0x3, &(0x7f0000003340)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78, 0xc041}, {&(0x7f00000033c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000003680)=[{&(0x7f0000003440)="e859f2adf32abc7c245ea172166c9e80536a5e5bb83ecd320b59fae3845ca7e9e6dfb6f5ed009e0bd87a39f86108bbf3b120ecc3867c37d7d50117f52222440e49d025e26f7dc44a9e12ad293c0052e1724e8b137ed592c4283409af172903263241eaa4bdcb3f2f9ae8c8e4580aa0244929ad611f7101689757afeeab647d9f79a63ec7a9e2116e6ee306d9d16082b7f8e9bbd02a829e5db38a4218c208d7084803eefbbfe380cd5969752c990c8fede56cce7862cb69d07d57e39a823626bc", 0xc0}, {&(0x7f0000003500)="ce4f233aaedd167616da4bdfb215bfdba80cdba2fffaa72a697daeb1feba5627dbdcfacd5f4a4cbadd4de4beef9a98a5d43d69226fcca0346e45f7b0a9e1ee24d1a1f693d976611f953e1b8709b73552311c153107d6585bfd917b655caa522cde071d9c38386f02423fd32cdf0725954e943a8adfe8788a3a59fbf0af5ac5d9c4692d3e212cc2cbd55ef7480ad3cb278972c8ffd3dbcde189d3b954389c25ea7a0e0b1ab7e19e3de7772a32ba045d267a72e8fb8834c9452ee39f1eda9b17eeb3", 0xc1}, {&(0x7f0000003600)="a30fc2e973bcb89332a00c3f07ad7a02f67dd63865f575ff6e2b891911c08534ce3780f24a09af2aab801200ab448eb77525cfef367a7e2cb49347d414b26dd5b99453ee3613f0b01e7e3bbce547ef33b1d655ad73f5ef3e2f465e96d439", 0x5e}], 0x3, &(0x7f0000003a00)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x100}, {&(0x7f0000003b00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000003bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0, 0x4042841}, {&(0x7f0000003c80)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003fc0)=[{&(0x7f0000003d00)="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", 0xfb}, {&(0x7f0000003e00)="b41c77d6b68cec10eebe2c88b1ecce6f947a29c77d60d80b52d09800c8e7e1a2068ba389db02c80440f2ee6657ea9e8fb6e12228a502d925fe23d7ece708c4423eb46246ddf551ebfaef9908535975904254ed2d608a7d3fc95420a0df925a02ae65f27e19d85572f07695426085e3438789347ad0b562226a4962f7324c080ca3506d6d8c0f0a33b57e0a89edcf3c70c3c85f423f291df5062aff52788bbaf09a229ec482f0db4778dd8520b3e56d083a5ff19bf3077193fc3154397f", 0xbd}, {&(0x7f0000003ec0)="cecc4e9d381a39cb3cd7c6899fb0335682a127a8a27c7825fe83a11849c69cb0f9e6f70cf2e79fd13c4e8a083740726fe4a87ac73cc160b74d2be68ae554d28e2d9ee03523e0bcd2fbd38ed8047d7cec7f3fc61ce22e3f447201793c93884b9d1d6c63afad464de299a639d87231ab394242d7c9d49537a217d4f31825e4089148fcead5acdb12cdd669935301ff6048d675fda0bc692da245942d72a249ccad8bb72937e4e0d8485f92e6df23ad51ca94e4ef182041bc975a9cf2ec73d34f1110234ecdaed6c87ec6864c770bf9bdfc65", 0xd1}], 0x3, &(0x7f00000040c0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r0, r2, r8}}}], 0xa8, 0x24040040}], 0x8, 0x85) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x0, 0x15, 0x0, &(0x7f0000000040)) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) dup3(r0, r1, 0x0) 18:56:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socket$tipc(0x1e, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000400)=""/1, 0x1}}, 0x120) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000000)="6a07aba80000000001000183904733ef4a09139cdb0c2d01b68be701000000b48b617ecc3fb84ce67481c4", 0x2b}], 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0xfd, 0x80}]}) inotify_init1(0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'netpci0\x00', 0x400}) [ 1003.931575][T27848] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1003.971588][T27848] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 1004.021019][ C1] sd 0:0:1:0: [sg0] tag#2022 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1004.031625][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB: Test Unit Ready [ 1004.038382][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.048188][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.057992][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.067876][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.077678][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.087489][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.097299][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.107110][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.116935][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.126665][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.136581][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.146396][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.156202][ C1] sd 0:0:1:0: [sg0] tag#2022 CDB[c0]: 00 00 00 00 00 00 00 00 18:56:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x0, 0x15, 0x0, &(0x7f0000000040)) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup3(r0, r1, 0x0) [ 1004.344799][ C1] sd 0:0:1:0: [sg0] tag#2023 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1004.355658][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB: Test Unit Ready [ 1004.362390][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.372214][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.382035][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.391859][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.401663][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.411482][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.421305][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.431220][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.441114][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.451032][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.460867][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.470677][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1004.480518][ C1] sd 0:0:1:0: [sg0] tag#2023 CDB[c0]: 00 00 00 00 00 00 00 00 [ 1004.499880][ T32] kauditd_printk_skb: 720 callbacks suppressed [ 1004.499936][ T32] audit: type=1326 audit(1595271416.286:36952): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30481 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1004.527584][ T32] audit: type=1326 audit(1595271416.286:36953): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30481 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1004.548966][ T32] audit: type=1326 audit(1595271416.286:36954): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30481 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1004.570349][ T32] audit: type=1326 audit(1595271416.286:36955): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30481 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1004.591760][ T32] audit: type=1326 audit(1595271416.286:36956): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30481 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:56:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x0, 0x15, 0x0, &(0x7f0000000040)) dup3(r0, r1, 0x0) [ 1004.727307][ T32] audit: type=1326 audit(1595271416.396:36957): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30481 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1004.748797][ T32] audit: type=1326 audit(1595271416.396:36958): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30481 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1004.770173][ T32] audit: type=1326 audit(1595271416.396:36959): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30481 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1004.791758][ T32] audit: type=1326 audit(1595271416.396:36960): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30481 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1004.813207][ T32] audit: type=1326 audit(1595271416.396:36961): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30481 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1004.848082][T15782] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1004.913869][T15782] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 18:56:56 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 18:56:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffbfffd}]}) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x800, 0x100010) inotify_init1(0x0) 18:56:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) read$char_raw(r0, &(0x7f0000000400)={""/38117}, 0x9600) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x0, 0x15, 0x0, &(0x7f0000000040)) dup3(r0, r1, 0x0) 18:56:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = dup2(r0, 0xffffffffffffffff) mq_notify(r1, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) shmget(0x1, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) inotify_init1(0x0) [ 1005.394178][T30511] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[30511] 18:56:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) read$char_raw(r0, &(0x7f0000000400)={""/38117}, 0x9600) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2, 0xfffffffe}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}], 0x18}}], 0x1, 0x4048880) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'veth0_to_batadv\x00', {0x2, 0x4e24, @rand_addr=0x64010100}}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = dup2(r0, 0xffffffffffffffff) mq_notify(r1, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) shmget(0x1, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) inotify_init1(0x0) 18:56:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) [ 1006.196661][T30516] ptrace attach of "/root/syz-executor.4"[10775] was attempted by "/root/syz-executor.4"[30516] 18:56:58 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0xfd, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2d, 'rdma'}]}, 0x6) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000040)=0x1) 18:56:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) read$char_raw(r0, &(0x7f0000000400)={""/38117}, 0x9600) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:56:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:56:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = dup2(r0, 0xffffffffffffffff) mq_notify(r1, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) shmget(0x1, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) inotify_init1(0x0) 18:56:58 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x29, 0x0, 0x0) fadvise64(r0, 0x9, 0x80, 0x5) 18:56:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) read$char_raw(r0, &(0x7f0000000400)={""/38117}, 0x9600) 18:56:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) dup3(r0, 0xffffffffffffffff, 0x0) 18:56:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = dup2(r0, 0xffffffffffffffff) mq_notify(r1, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) shmget(0x1, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) 18:56:59 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x40, 0x0) r0 = inotify_init1(0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x3f, 0x6, 0x3, 0x2, 0x2, 0x0, 0x3, 0x2ce, 0x38, 0x1d9, 0x8, 0x7, 0x20, 0x2, 0x4, 0x100, 0x8}, [{0x4, 0x101, 0x5, 0xffffff35, 0x9, 0x8, 0x8, 0x6}, {0x3, 0x10000, 0x80, 0x1, 0x8, 0x753, 0x1, 0xcdb}], "9dbd0fbd2ff4a8829ccebe23c5bf7cef86bce9348a68eaffa9660258b635651aa799fb0aca0c02797b99e21e3a202c96c673ab864b5d3be8934688d8b64207b07239bced6e470a450526946c1abd73f558ed84bde31b0474af7a107ee70572010d5a436c471a1ef16d3c30340b7a8172ac7a80a9c9f3d5d428ef3dfff5c4ad8e324018b2dd566629a041b96484da4d9c3b755f73ae923ab9e80f20844fdffa637b1d27ce71ebc1c06e40a50923a2d95a171bd3eb53d236b07046984e5fd0f8bb5eb240270f39d75e730186d78493d616f9a0c887ec763503a87a71b79fd19550df", [[], [], [], [], [], [], [], [], []]}, 0xa59) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111}}, 0x20) read$char_raw(r0, &(0x7f0000000400)={""/38117}, 0x9600) [ 1007.382931][T30564] ptrace attach of "/root/syz-executor.3"[9974] was attempted by "/root/syz-executor.3"[30564] 18:56:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = dup2(r0, 0xffffffffffffffff) mq_notify(r1, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) [ 1007.458770][T30566] ptrace attach of "/root/syz-executor.3"[9974] was attempted by "/root/syz-executor.3"[30566] 18:56:59 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) dup3(r0, 0xffffffffffffffff, 0x0) 18:56:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:56:59 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000020000002901000008000000f300000000000000"], 0x18}}], 0x1, 0x4048880) dup3(r0, 0xffffffffffffffff, 0x0) 18:56:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) read$char_raw(r0, &(0x7f0000000400)={""/38117}, 0x9600) 18:56:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) read$char_raw(r0, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) read$char_raw(r0, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, r0, 0x0) 18:57:00 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:00 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x44, r3, 0xef8c987201b6e653, 0x0, 0x0, {0x26}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0xfffffffffffffffa}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x84, r3, 0x400, 0x70bd27, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x10001}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5c31}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x4}}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x20040054) r4 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r4, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x0, @rand_addr=0x64010100}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="8e", 0x1}], 0x1}}], 0x2, 0x0) sendmmsg$inet_sctp(r4, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x20) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000)={r6, 0x9566, 0x401}, 0x8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:57:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, r0, 0x0) 18:57:00 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:01 executing program 1: read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:01 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, r0, 0x0) [ 1009.629150][ T32] kauditd_printk_skb: 794 callbacks suppressed [ 1009.629204][ T32] audit: type=1326 audit(1595271421.416:37756): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1009.657489][ T32] audit: type=1326 audit(1595271421.416:37757): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:57:01 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) [ 1009.679020][ T32] audit: type=1326 audit(1595271421.416:37758): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:57:01 executing program 1: read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:01 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) [ 1009.997614][ T32] audit: type=1326 audit(1595271421.496:37759): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1010.019430][ T32] audit: type=1326 audit(1595271421.496:37760): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1010.041498][ T32] audit: type=1326 audit(1595271421.496:37761): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1010.063077][ T32] audit: type=1326 audit(1595271421.496:37762): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1010.084847][ T32] audit: type=1326 audit(1595271421.496:37763): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1010.106327][ T32] audit: type=1326 audit(1595271421.496:37764): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:57:01 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) getpid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100)='mptcp_pm\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="48000000100000040000000000000000000000008858bae3131c349c421c267f88a6c58c3864256cb5e6264187b158380d649594b637fca886c320c25924e79e4ed7226f50aa66dbaa6193e9c90ef233bf32ae2006241de4e188961bec280a20df84a66ae8c79673afcb4ac4130d1067cf868884a69d9cfcaaeeec57e9e012baf64b3b0ea38f4c0e1ea0e4139ff10a70e64c5548c054b9cf4a86a5768435b85927ee408a5905bc420413323283463e3889e18da8823b9ddddef2a2f35e17f3fa159f31a328a6b3fd38442a029b626686de7be39ffe3ffb36a10000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100677470001400028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000300", @ANYRES32=r8, @ANYBLOB], 0x48}}, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=r5, @ANYBLOB="000425bd7000fddbdf2505000000080003000600000014000180050002000300000008000700", @ANYRES32=r8, @ANYBLOB="040001800800030008000000080003000700000048000180060005004e240009050002001d0000000800060006000000060001000a000000050002000400000014000400ff01000000000000000000000000000106000100020000000800020002000000"], 0x94}, 0x1, 0x0, 0x0, 0x8004}, 0x400) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r9, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r9, 0x89f3, &(0x7f0000000480)={'ip6gre0\x00', &(0x7f0000000400)={'ip6_vti0\x00', r4, 0x4, 0x0, 0x8, 0x80000001, 0x43, @remote, @remote, 0x10, 0x7, 0x5, 0xdfd}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) process_vm_readv(r10, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1010.128292][ T32] audit: type=1326 audit(1595271421.496:37765): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:57:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:02 executing program 1: read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:03 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:03 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:03 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:04 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:04 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:04 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:04 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, 0x0}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:06 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xc0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x8}, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0xfffffffa, r0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r0, 0x4) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r1, 0xc0245720, &(0x7f0000000000)={0x1}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 18:57:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) [ 1014.671551][ T32] kauditd_printk_skb: 72 callbacks suppressed [ 1014.671605][ T32] audit: type=1326 audit(1595271426.457:37838): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30749 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1014.699674][ T32] audit: type=1326 audit(1595271426.467:37839): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30749 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1014.721205][ T32] audit: type=1326 audit(1595271426.467:37840): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30749 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1014.742599][ T32] audit: type=1326 audit(1595271426.467:37841): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30749 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1014.764071][ T32] audit: type=1326 audit(1595271426.467:37842): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30749 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=325 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1014.785485][ T32] audit: type=1326 audit(1595271426.477:37843): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30749 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1014.806957][ T32] audit: type=1326 audit(1595271426.477:37844): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30749 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1014.828354][ T32] audit: type=1326 audit(1595271426.477:37845): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30749 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1014.849763][ T32] audit: type=1326 audit(1595271426.507:37846): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30749 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1014.871148][ T32] audit: type=1326 audit(1595271426.507:37847): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30749 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=321 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:57:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) inotify_init1(0x0) 18:57:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:07 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) r4 = openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x200381, 0x12b}, 0x18) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r7}]}, 0x48}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000100)={'gretap0\x00', r7, 0x7, 0x7800, 0x7fffffff, 0x400, {{0x13, 0x4, 0x0, 0x4, 0x4c, 0x68, 0x0, 0x9, 0x4, 0x0, @local, @multicast1, {[@lsrr={0x83, 0x7, 0x8b, [@local]}, @generic={0x7, 0xb, "a22ba0ae7326bd41c2"}, @generic={0x89, 0x6, "ec0f07bb"}, @rr={0x7, 0x17, 0x6c, [@loopback, @loopback, @remote, @private=0xa010102, @local]}, @generic={0x44, 0x9, "adde97f16aa833"}]}}}}}) inotify_init1(0x0) 18:57:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$isdn(r1, &(0x7f0000000080)={0x22, 0x4, 0x7, 0xff}, 0x6) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) 18:57:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x0, @thr={&(0x7f0000000000)="2e2f450e529ba9a376e306f96d82a8d296f9fcbb37d5d2e7484a12f9b37929752c015579fddd4fed5292043f3b0fe7c3d1ec49bfd4af0e8b01f1598d128233b7b8f8df76e1d531b7017498ba8a1bcc8ff857082502344ead1d1735a0edb12a49", &(0x7f0000000100)="3fc91419e6438e123d6b033f955e66fa5d6faa41d03ee698766cbaf7795483363395a87dd58c12923a3b79b8eb55cda14c4ca1bbcbcb795eca8292c2af1d4f73aa9a69ae3a5378399548b6756540cbd930e80a1d72a471a4bbc3dc56055950acdad2025319a85d0e13185a0956bf579a"}}) 18:57:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) mmap$snddsp_control(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x83000000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:57:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x80000) 18:57:09 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r3, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000800) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="a92f5a00", @ANYRES16=r3, @ANYBLOB="00012bbd7000fddbdf25010000009c010c8014000b80080009001751c75208000a0063ae000044000b8008000a00e119000008000a000b67000008000a00398a000008000a00d2cb0000080009002c0e684208000a0059a100000800090046f9965208000a00526b00000c000b8008000a001e9b00001c000b8008000900d7749f5908000a00ef1400000800090017c7e6573c000b80080009005267973f08000a007145000008000a007b58000008000a0083d9000008000a002ead000008000a009af900000800090080ea9c024c000b80080009007ac7be7e080009006f35ea2008000a005fa3000008000a0048b8000008000a00dc0c000008000900728c422f08000900e511e279080009002683504308000a00904b000054000b8008000a0099b2000008000a00552d000008000a00f443000008000900d77b447208000a00ee6c000008000900ed88ae5f08000900398b4a2508000a00f352000008000900dfe5717d08000a00c81600000c000b8008000a006f17000024000b8008000a00273700000800090072800b4708000900f569663508000a00817f00000c000b8008000a00a2040000"], 0x1b0}, 0x1, 0x0, 0x0, 0x20000100}, 0x4000090) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x28, r3, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8006}, 0x20004080) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0x2dc, r3, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x140, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4e}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x22}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb0}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7078c5da}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x34}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1cf24fc3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa964d8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x50}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x92ce86b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x487f6134}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x49189ffc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x40c2c696}]}, {0x4}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77c7e5ed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x544c74d3}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1eeca66}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xc577d51}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x13ac10ff}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3be2f423}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x70a3fd7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x12}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x24, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cbdd2e4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39b97c08}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1ac34e9}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x11c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ea9c89}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6594}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a13}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6fe5c65d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x181b213f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6563ad98}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61d689dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41e1642}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x77db}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7958ed7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa8b0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4eb5d01c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6f4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x94cf}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2cf2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ae822b5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2e8f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x63a0a029}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x52eb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79281453}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc869}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7d55}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1a264c7e}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x36d2d105}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1af}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf05f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x25c29690}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x824}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa99a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a1eb572}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xefb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5f12cd9c}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}]}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x20044091}, 0x0) 18:57:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) read$char_raw(0xffffffffffffffff, &(0x7f0000000400)={""/38117}, 0x9600) 18:57:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mq_notify(0xffffffffffffffff, 0x0) 18:57:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) inotify_init1(0x0) 18:57:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:57:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4400ae8f, &(0x7f0000000000)) 18:57:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) 18:57:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000), 0x2) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) [ 1018.772754][T30852] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 18:57:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000a0000000000290000000800000000a4875e0ff5c993dbcd1afe70aa713d6313aa8e30b309a9cd98199fcb12bd6546276bb4b564315cc48b549023a586b9dcaf5a4502dc377b9600f797776cf1bf0cb98bc4618b53d9134819f1bd1c97a0c233a188a1018335a102067aafffe9f93cf915aa"], 0x18}}], 0x1, 0x4048880) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000380)={0x0, @adiantum}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000480)={0x7, 0x15, 0x1}, 0x7) inotify_init1(0x800) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x28) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000080)=0xfffffffa) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000240)={0x7, &(0x7f0000000200)=[{0x0, 0x80, 0xa2, 0x1}, {0x6, 0x30, 0x5, 0x1}, {0x5, 0xe7, 0x9, 0x40}, {0x81, 0x9, 0xfc, 0xed}, {0x0, 0x20, 0xeb, 0x9}, {0xffff, 0x2, 0x81, 0x10000}, {0xff, 0xfe, 0x0, 0xa823}]}) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000000)={0xfff, 0x3, 0x73}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x40800, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000140)='highspeed\x00', 0xa) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000002c0), &(0x7f0000000340)=0x4) 18:57:10 executing program 0: 18:57:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) read$char_raw(0xffffffffffffffff, 0x0, 0x0) 18:57:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$IPSET_CMD_DEL(r0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) 18:57:11 executing program 0: [ 1019.684135][ T32] kauditd_printk_skb: 477 callbacks suppressed [ 1019.684190][ T32] audit: type=1326 audit(1595271431.467:38325): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30880 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:57:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:57:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, r0, 0x0) 18:57:11 executing program 1: [ 1019.931681][ T32] audit: type=1326 audit(1595271431.507:38326): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30880 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1019.953440][ T32] audit: type=1326 audit(1595271431.507:38327): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30880 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=16 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1019.974880][ T32] audit: type=1326 audit(1595271431.507:38328): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30880 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1019.996353][ T32] audit: type=1326 audit(1595271431.507:38329): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30880 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1020.017928][ T32] audit: type=1326 audit(1595271431.517:38330): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30880 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1020.039389][ T32] audit: type=1326 audit(1595271431.517:38331): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30880 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=157 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1020.060951][ T32] audit: type=1326 audit(1595271431.547:38332): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30880 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1020.082433][ T32] audit: type=1326 audit(1595271431.547:38333): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30880 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1020.103985][ T32] audit: type=1326 audit(1595271431.557:38334): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=30880 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:57:12 executing program 0: 18:57:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000240)) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xd0, r4, 0xd0b2366ba28ff5f8, 0x70bd28, 0x25dfdbfc, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x9}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x401}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 18:57:12 executing program 1: 18:57:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x800) 18:57:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, r0, 0x0) 18:57:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0xfffffffffffffffc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000815, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004081000418e00000004fcff", 0x58}], 0x1) 18:57:12 executing program 1: 18:57:12 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)={0x40, 0x4, 0x9, 0x0, 0xfffffffe, 0x6}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:57:13 executing program 1: 18:57:13 executing program 0: 18:57:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, r0, 0x0) 18:57:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002580)={0x1b4, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE={0x1a0, 0x2a, "7bd56249d6f44bfda3a46c6ac2a069be149fcc0e27744981e5bb0782f5cfcf04fc15afdc23ccda3332736d3def502d9a0ccfb2272797ebe6f4a0b0d533f0676291bf5f56a262b7b9a524bca47c565bdc5392d83649189a6f1df86fa770ce6ff6e22a3dbff4495953f65366020596c114047f562012566cc67a0e45099231372e686daa107bc395fe812e8f773a0428c40eaaa3ff7aee0c3aecc155e0c93f80ddf87cb3a8a77da2eefe74d96311f046c190ef359d57e7de4d577bb1d09d896ca132a185269ca2ca33e32025d54e0328fcb0383f3d39f3b2dac143b56a3cdc19eb31e6e53692557337d972254078e9e3d5bef64005525ab60f29624f13021d564f157f884953df5af60f67d1dec539fed71c524bf3289cc367471d281a9dab12c5fce517e1b6d470970e5e86318404831f2ca34e239be1d1057491817ba5781b0a70e431a1848235b4edc17627483d023025adadae20b48dbd03432f1d77021db9964553c420338ebcd68fb86617771c405c173c6e54aaa96041b5fbeaa688b1113b7ed331e87786dc4fc56d62bcddeb7cf3fc53662dbe52334a644505"}]}, 0x1b4}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r2, 0xf335e66f9f3c631d, 0xf0bd29, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4c004) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 18:57:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x3, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x80080, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000080)=0xdc2) inotify_init1(0x0) 18:57:13 executing program 1: 18:57:13 executing program 0: 18:57:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, 0xffffffffffffffff, 0x0) 18:57:13 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000040)={0x9b0000, 0x7fffffff, 0x101, r3, 0x0, &(0x7f0000000000)={0x98091c, 0x7ff, [], @value64=0x42a8}}) ioctl$SOUND_MIXER_READ_RECSRC(r4, 0x80044dff, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:57:14 executing program 1: 18:57:14 executing program 0: 18:57:14 executing program 1: 18:57:14 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, 0xffffffffffffffff, 0x0) 18:57:14 executing program 0: 18:57:14 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e20, 0x80, @dev={0xfe, 0x80, [], 0x33}, 0x5}, {0xa, 0x4e22, 0x10, @private2={0xfc, 0x2, [], 0x1}, 0x9}, 0x1, [0xbf7, 0x9, 0x10000000, 0x1, 0x8, 0x101, 0x8, 0x10000]}, 0x5c) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') openat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x25c040, 0x50, 0x11}, 0x18) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="080025bd7000ffdbdf25160000005800018044000400200001000a004e21002105a0ff02000000000000000000000000000102000000200002000a004e21ffffffff0000000001010000000d0001007564703a73797a31000000000000000000000000000000e30b40d0316fc02caba4ca98c3aa0b415539e43ea299d0a2661912c54485be56fae7f449f94f16044566c15395d4becd89282c5783c9eb88bc3e56e7bb08ca74020abeab734738580145d95e004d779c5e75ce9182c6e1c7b893ce245761dc586ba4ebf759c574506ff16a8941"], 0x6c}, 0x1, 0x0, 0x0, 0x4000001}, 0x100) 18:57:14 executing program 1: 18:57:14 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, 0xffffffffffffffff, 0x0) 18:57:14 executing program 0: 18:57:14 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r3, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000800) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="a92f5a00", @ANYRES16=r3, @ANYBLOB="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"], 0x1b0}, 0x1, 0x0, 0x0, 0x20000100}, 0x4000090) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x28, r3, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8006}, 0x20004080) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0x454, r3, 0x8, 0x70bd25, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x15c, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x40d43675}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x204099e9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x44}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a5ab7e5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7e9c625e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x57}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6a7f49dc}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x695c409d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x73}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xad}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb0}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x96}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x40}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x25061259}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4c60eab4}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x22}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4878f58}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x443f0162}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x22d2ac69}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xde}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x427eff48}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7681347f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x57}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2d37776f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6e37bebd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x9c1ab03}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xd0, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4a9dce7b}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x32}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf8}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2dca07d9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x38}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b0cd696}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x10}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77ac3a03}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x98}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x35}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3ee3ae80}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x78c4bbe5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x30d9c7e7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5873dd22}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x59037daf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x757935a4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x707f8d7e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6a}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x160, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xec}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5dc7f937}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7a74d488}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x125b26ec}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x131591b7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18edc0d7}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x36f0de5a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a6949bc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77e19e57}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b237020}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x20eeaaed}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x33e35cd4}]}, {0x4}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x71}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x426c8d02}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x57}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x23b03571}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3d57abe2}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3d162208}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x754b89fe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1f7150f6}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x19e4b749}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x44abb482}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x59}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6e84ed3e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6c0c714f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x44}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x19f009f5}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x54, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}, {0x5}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x454}, 0x1, 0x0, 0x0, 0x1}, 0x20004080) 18:57:15 executing program 1: 18:57:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) 18:57:15 executing program 0: 18:57:15 executing program 2: 18:57:15 executing program 1: 18:57:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) readahead(r1, 0x1, 0xdc) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 18:57:15 executing program 2: 18:57:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2000000000000103}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:57:15 executing program 0: 18:57:15 executing program 1: 18:57:16 executing program 0: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x0, r0}) recvmsg(r2, &(0x7f000095cfc8)={0x0, 0x0, 0x0}, 0x0) dup2(r1, r2) tkill(r0, 0x15) 18:57:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACSEC_CIPHER_SUITE={0xc}]}}}]}, 0x40}}, 0x0) 18:57:16 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x212e01, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) sendfile(r1, r2, &(0x7f0000000080)=0x8, 0x80000001) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x4, 0xfffffff8, 0xd8f, 0x401, 0x7, "b4d42e8caa741371f9e654709ff36a8939aae8", 0x9}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:57:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) 18:57:16 executing program 4: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) connect$phonet_pipe(r0, &(0x7f0000000000)={0x23, 0x8, 0x8, 0x7f}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) [ 1024.754173][ T32] kauditd_printk_skb: 371 callbacks suppressed [ 1024.754225][ T32] audit: type=1326 audit(1595271436.537:38706): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31004 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1024.782313][ T32] audit: type=1326 audit(1595271436.537:38707): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31004 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1024.803867][ T32] audit: type=1326 audit(1595271436.567:38708): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31004 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:57:16 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f00000001c0)='/dev/video#\x00', 0x8, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000200)={0x0, 0x2, 0x0, "9fb9fc80d848348f14d58334f1c23258dcecacd3b1963f6bb6323a62807b9cd2"}) 18:57:16 executing program 0: 18:57:16 executing program 2: 18:57:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) [ 1025.264122][ T32] audit: type=1326 audit(1595271436.607:38709): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31004 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1025.285675][ T32] audit: type=1326 audit(1595271436.607:38710): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31004 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1025.307504][ T32] audit: type=1326 audit(1595271436.617:38711): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31004 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1025.328960][ T32] audit: type=1326 audit(1595271436.617:38712): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31004 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:57:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f0000001780)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='('], 0x28}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000180)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x1, 0x0, 0x0) [ 1025.350513][ T32] audit: type=1326 audit(1595271436.617:38713): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31004 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1025.372075][ T32] audit: type=1326 audit(1595271436.617:38714): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31006 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1025.393583][ T32] audit: type=1326 audit(1595271436.617:38715): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31006 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 18:57:17 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r3}]}, 0x48}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000440)={'syztnl0\x00', r3, 0x29, 0xe0, 0xd2, 0x9, 0x9, @local, @private0, 0x20, 0x8, 0x3f, 0x8}}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r5, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000340)={0x7, 0x0, 0x1, 0x2, 0x4, [{0xffffffffffffffe0, 0x400, 0x4, [], 0x2}, {0x918, 0x8, 0x6, [], 0x688}, {0x9, 0x0, 0xba7d}, {0x0, 0x3, 0x400, [], 0x2000}]}) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r7}]}, 0x48}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@ipv4={[], [], @broadcast}, @dev={0xfe, 0x80, [], 0x21}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4, 0x2, 0xce, 0x100, 0x1f, 0x4800030, r7}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r8}]}, 0x48}}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x5, r8, 0x1, 0xfc, 0x6, @local}, 0x14) 18:57:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 18:57:17 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)) 18:57:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x100, 0x6, 0x0, 0x1ff}]}) inotify_init1(0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101001, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x3902) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$inet(0x2, 0x1, 0x7) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 1025.751345][T31035] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1025.767759][T31035] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1025.775493][T31035] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1025.830755][T31035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1025.839137][T31035] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 18:57:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002400)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) 18:57:17 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/130, 0x82}], 0x1, 0x0) 18:57:18 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000100)="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") 18:57:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) 18:57:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "e2ea200000000000008200000000c260285300"}) 18:57:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040)) inotify_init1(0x0) [ 1026.587593][T31057] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1026.605124][T31057] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1026.616764][T31057] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1026.663700][T31057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1026.672080][T31057] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 18:57:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000100)={"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"}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) 18:57:18 executing program 3: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)=0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:57:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000000)="3e0f01c40f20e035000100000f22e0c4e279347b000f070f01cab9800000c00f3235002000000f3066ba4200b809200000efc4c1785acec4e16e5f1866baa100b000ee", 0x43}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:57:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2000, 0x3, 0x2e8, 0x0, 0x150, 0x150, 0x138, 0x0, 0x218, 0x238, 0x238, 0x218, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3], 0x0, 0xd0, 0x138, 0x0, {}, [@common=@inet=@socket3={{0x28, 'socket\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 18:57:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, 0x0) [ 1027.800156][T31093] xt_CT: No such helper "snmp" 18:57:19 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1b7082, 0x45) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='[*-/\\\x00') sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) fcntl$getflags(r0, 0x408) 18:57:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:57:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000010c0)=ANY=[@ANYBLOB="64000000020605000a0000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000800000050005000000000005000100060000001c000780080008409effff3d0600044000f0ffff050005"], 0x64}}, 0x0) 18:57:19 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000540)) msgsnd(r0, &(0x7f0000000000)=ANY=[], 0x0, 0x0) msgrcv(r0, &(0x7f0000000040), 0x8, 0x0, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x3, 0x3800) 18:57:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004081000418e00000004fcff", 0x58}], 0x1) [ 1028.208544][T31108] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 18:57:20 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000600)=[@cswp={0x58, 0x114, 0x7, {{}, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x28}}], 0x58}, 0x0) 18:57:20 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x2, &(0x7f0000000000)=[{0x100, 0x0, 0x0, 0x7ffc0081}, {0x9, 0x7f, 0x20, 0x9}]}) inotify_init1(0x0) 18:57:20 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000600)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000080), 0x0}}], 0x58}, 0x0) 18:57:20 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) r0 = socket$isdn(0x22, 0x3, 0x4) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/210, 0xd2}], 0x1, 0x1) 18:57:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000012000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c866b94d0900000f320f0133f30f01e80f69e8650f01c883dd000f0131ba400c3ef20f2c2b66efbafc0ced", 0x33}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000200)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000240)={[0x0, 0x0, 0x0, 0x0, 0x200000000000203, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:57:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x30, r1, 0x1, 0x0, 0x0, {0x1a}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}, @NL80211_ATTR_FREQ_RANGE_END={0x8}]}]}, 0x30}}, 0x0) 18:57:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x9effff4d}, @IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_PORT_TO={0x6}]}]}, 0x64}}, 0x0) 18:57:21 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000000)={0x3, r3}) 18:57:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000100)=@generic={0x1, 0x0, 0x1}) 18:57:21 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/154, 0x9a}, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/65, 0x41}], 0x1}}], 0x48}, 0x0) [ 1029.761810][ T32] kauditd_printk_skb: 268 callbacks suppressed [ 1029.761869][ T32] audit: type=1326 audit(1595271441.547:38984): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:57:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000340)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x2, 0xa}]}}}}}}}}, 0x0) 18:57:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) [ 1029.959131][ T32] audit: type=1326 audit(1595271441.577:38985): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1029.980885][ T32] audit: type=1326 audit(1595271441.577:38986): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1030.002516][ T32] audit: type=1326 audit(1595271441.587:38987): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=310 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1030.023983][ T32] audit: type=1326 audit(1595271441.587:38988): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 [ 1030.045561][ T32] audit: type=1326 audit(1595271441.587:38989): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1030.067223][ T32] audit: type=1326 audit(1595271441.587:38990): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1030.088715][ T32] audit: type=1326 audit(1595271441.607:38991): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:57:21 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0xfe, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) 18:57:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x124, &(0x7f00000003c0)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1030.110196][ T32] audit: type=1326 audit(1595271441.607:38992): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=1 compat=0 ip=0x45c1d9 code=0x7ffc0000 [ 1030.131462][ T32] audit: type=1326 audit(1595271441.607:38993): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=31150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x7ffc0000 18:57:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r2, &(0x7f0000000280)=[{&(0x7f0000000140)='1', 0x1}], 0x1) 18:57:22 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r1, 0x541e, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000140)={0xd, 0x8001}) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)='/dev/video36\x00') keyctl$clear(0x7, r0) r2 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$read(0xb, r2, &(0x7f0000000080)=""/29, 0x1d) 18:57:22 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)) 18:57:22 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4c0000000714040600000000000000250900020073797a31000000000900020073797a3000000000050054000000000005a23948759b27b1e900061336f2b4f48951"], 0x4c}, 0x1, 0x0, 0x0, 0x40844}, 0x20000010) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x30100, 0x0) 18:57:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000a40)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000240)=[{0x10, 0x1, 0x2}], 0x10}}], 0x1, 0x0) 18:57:22 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x10, 0x0, 0x7ffc0001}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:57:22 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000780)}, 0x0) 18:57:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) 18:57:23 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x10, "3d5f893a7ebac4cdbaa471c3f4d5f1ba"}, &(0x7f0000000180)=0x18) 18:57:23 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x406, 0x0, 0x0, 0x6}, {0xadd, 0x4, 0xc0, 0x8a0}]}) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000000080)=0x7) inotify_init1(0x0) 18:57:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2000, 0x3, 0x2e8, 0x0, 0x150, 0x150, 0x138, 0x0, 0x218, 0x238, 0x238, 0x218, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3], 0x0, 0xd0, 0x138, 0x0, {}, [@common=@inet=@socket3={{0x28, 'socket\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1031.831899][T31222] xt_CT: No such helper "snmp" [ 1031.899945][T31225] xt_CT: No such helper "snmp" 18:57:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x124, &(0x7f00000003c0)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 18:57:25 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x1) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xd399e8c31c0ac626}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0xe, 0x5) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendfile(r4, r4, 0x0, 0x8080fffffffe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x6c}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3f5, 0x400, 0x70bd27, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4010800}, 0xc000) 18:57:25 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffbffff}]}) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3}]}, 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10020000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=@ipv6_getroute={0x60, 0x1a, 0x100, 0x70bd29, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x9, 0x82, 0x4, 0xc8, 0x6, 0x800}, [@RTA_MARK={0x8, 0x10, 0x63}, @RTA_PREF={0x5, 0x14, 0x6}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_IIF={0x8, 0x3, r4}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @typed={0xc, 0x67, 0x0, 0x0, @u64=0x2}}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @nested={0x10, 0x18, 0x0, 0x1, [@typed={0xc, 0x56, 0x0, 0x0, @u64=0x9}]}}]}, 0x60}}, 0x20000004) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r5}}, 0xc) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r6, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="380000000a14000027bd2508001500030000000800030002000000080001b7b5e29070a7c554054468b80002000000080003000400000008001500010000000000000000"], 0x38}, 0x1, 0x0, 0x0, 0x81}, 0x4000800) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r7, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) fcntl$F_GET_RW_HINT(r7, 0x40b, &(0x7f0000000000)) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:57:25 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000080)=r0) 18:57:25 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) 18:57:25 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) inotify_init1(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x1, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000001640)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000001680)=0x2c) sendmmsg$inet6(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@dstopts={{0x140, 0x29, 0x37, {0xff, 0x24, [], [@calipso={0x7, 0x28, {0x3, 0x8, 0x62, 0xcb9f, [0x7, 0x80, 0x0, 0xb1]}}, @generic={0x0, 0xdd, "ee93986c59175138450ac0e636616b3d55225a96bb7f26a230e4001d5e72af90e2079b15a23cbb1a7d45b48a5d57754e5d07e44f3930e34446d15256653563080a44980047050a5c9797447d91f7e54940117affbfc555ccc8b9c46f994548b8067cf96f7a970da79d3ef24803af1d1e0585e363811cc66b0ae4f20f6b935735af233073e3841dc70c8112e7808565dcf6ad707782dff11bc683f8bf770699beefc8f089456e6766c716173fdad3c3f2830034068ee2a1fbb32393e1eba6b1a37614d3c49410763881f320b5bd7531e8948f9abfb853bca5bd9a35396d"}, @generic={0x72, 0x1a, "f717578d54370a6f9e9cbec1ee0c11f10c1f423a9ba95c3a6e2e"}]}}}], 0x140}}], 0x1, 0x4048880) sendmsg$inet6(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000000)="943065af8fdb21df17718a5610c1a77444f5d16956dd80e1fa3e80252b461f26a43476565121fa04009d8056e3017951133208284eda9c1a7bdd89840092f51356871906d2e514a04f8c2b3783016417ea7c36b0178352afadf2c9eadd17b711d3b06677f3c515c4", 0x68}, {&(0x7f0000000080)="7715ad338ed580d3fe2e0950d3646d4733", 0x11}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000100)="5f2c07292231a3e6682bb431200a10d18a65ce17d74a058a5a9e666f9b0b763c0700f56e76", 0x25}, {&(0x7f0000000140)="69406bd2a97acdbe6be0a4d58c42902e5b34c73c1f3e2b53d8113b12e2da7a70237119d3237303228bbb1e8a3c9bf9a8a52f6d57202b863fd1683f191f8e76fcb2edde914aefb0d0cd79e7712b4fe09cd43de68981dffa079230e24c42b1236f8cf8ca502981e745aae6a1846b6899336c3fbd6ccc02cb34cc6e5e7937e5a3799d2dd8ec50b09778d7e8784548b2c93f4fbcfb05bdd7ac81918575684998502fab6a", 0xa2}, {&(0x7f0000000200)="329cb7cbd98e44c01c02e14d30bd1d32e1a820d2d0ac3bfe1422be2d40c8b0281c4c4bc67bd803dfde4332ea11061bd39560ad5757bbb9ed", 0x38}, {&(0x7f0000000240)="5849befe2b1f4a4a3c59f2fba2c37f03e391a73a9e03ab3c649c46aca62aa024f09eb5af152aa4beb17e9fb9876344584fa5aebb94a6b731025796ea21ca2663dd", 0x41}, {&(0x7f0000001340)="705b25105a0dc0fe721a1f4b42820fe9dfbfefd83e290641b05d3fd590cea860a70c3cf6f68976e63d4d4b6541ffa4515137e790c7a04aface612dfe2ca0c83d5c0130b1b89167461cd06dfe9154aea0113938d36294a6f6aeb6494a9a675cb489deb31c51d5196c01a1e46bb79234bb5d70b5d24c47e99233042af59a4fa6ad7e6cf3d97d2d40a946a757460aff4016554e4bf3e97bd8406e3b62f3b52eeddc03988d91ac9094a75c", 0xa9}, {&(0x7f0000001400)="9892179929d965a785111e59d36ab03da6fa62fb582f0d19e136d1705aacc13fe9d37fa05cf173b0ae526699c5591fcc27967286fbcf640d25b93afb4c378f2d8935db80054060b15ee3bad2a0ab1d4ba0e5b5bf6a201b55a76f9b906943b51d704ed1b7bb3a81843d6136e32f15008876f6b42ff3f0917a3d0d40dd8bb5e79a74f63d436c1e4844f7ecf7ed655defb5a5acd14dcb1ff652716c76d73d5f908832f3dce77c885508c2f3a3492196409070ab27d214155bc38f801e", 0xbb}], 0x9, &(0x7f00000016c0)=[@hopopts_2292={{0x50, 0x29, 0x36, {0x2, 0x6, [], [@enc_lim={0x4, 0x1, 0x6}, @hao={0xc9, 0x10, @empty}, @enc_lim={0x4, 0x1, 0x12}, @ra={0x5, 0x2, 0x2}, @ra={0x5, 0x2, 0x2}, @padn={0x1, 0x1, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}]}}}], 0x6a}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x4048880) fcntl$getownex(r2, 0x10, &(0x7f00000015c0)) 18:57:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x8000000, 0x4) 18:57:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x126, &(0x7f00000003c0)="f7f249b9740c9e02007f00000000000032a5b60a00008024c30e478947d190ac00000000000000000000000097ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a4b0d8b9aad9c9ba4c998db2f7155d302a7be122bb1609f8b0164eb12c07af20200169c864e1d5f8179cba2e431126de0594cf1487e311e84395a80adbe3e7f3622703c353de8e6928bfd5a5f2cc05e4b942d6ed155b67a555f4b2e2b0cd0e93e41c330f70401c1d920006e65fab4fae51bb32a6f3ca61632d15b0c1cec89839cd7fe16d03af16efd5295d2eea42f3e25765b72b9727176c1966620ada4a27b28739a2eed558cee393ecaa3df004548e6f43be3f968529e96628cebee42b6fa46cb0b55a45cadf1f354a424830def8e07cc514d7615c7689e93ad448a65e9ea04c454bcd4"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 18:57:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) [ 1034.857664][T31282] ===================================================== [ 1034.864632][T31282] BUG: KMSAN: uninit-value in crc32_le_base+0x4d2/0xd10 [ 1034.866836][T31282] CPU: 0 PID: 31282 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 1034.866836][T31282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1034.866836][T31282] Call Trace: [ 1034.866836][T31282] dump_stack+0x1df/0x240 [ 1034.866836][T31282] kmsan_report+0xf7/0x1e0 [ 1034.866836][T31282] __msan_warning+0x58/0xa0 [ 1034.866836][T31282] crc32_le_base+0x4d2/0xd10 [ 1034.866836][T31282] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1034.866836][T31282] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1034.866836][T31282] ? __update_load_avg_cfs_rq+0x1a8/0x13b0 [ 1034.866836][T31282] crc32_update+0xb2/0x110 [ 1034.866836][T31282] ? crc32_init+0xd0/0xd0 [ 1034.866836][T31282] crypto_shash_update+0x4e9/0x550 [ 1034.866836][T31282] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1034.866836][T31282] ? crypto_hash_walk_first+0x1fd/0x360 [ 1034.866836][T31282] ? kmsan_get_metadata+0x4f/0x180 [ 1034.866836][T31282] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1034.866836][T31282] shash_async_update+0x113/0x1d0 [ 1034.866836][T31282] ? shash_async_init+0x1e0/0x1e0 [ 1034.866836][T31282] hash_sendpage+0x8ef/0xdf0 [ 1034.866836][T31282] ? hash_recvmsg+0xd30/0xd30 [ 1034.866836][T31282] sock_sendpage+0x1e1/0x2c0 [ 1034.866836][T31282] pipe_to_sendpage+0x38c/0x4c0 [ 1034.866836][T31282] ? sock_fasync+0x250/0x250 [ 1034.866836][T31282] __splice_from_pipe+0x565/0xf00 [ 1034.866836][T31282] ? generic_splice_sendpage+0x2d0/0x2d0 [ 1034.866836][T31282] generic_splice_sendpage+0x1d5/0x2d0 [ 1034.866836][T31282] ? iter_file_splice_write+0x1800/0x1800 [ 1034.866836][T31282] direct_splice_actor+0x1fd/0x580 [ 1034.866836][T31282] ? kmsan_get_metadata+0x4f/0x180 [ 1034.866836][T31282] splice_direct_to_actor+0x6b2/0xf50 [ 1034.866836][T31282] ? do_splice_direct+0x580/0x580 [ 1034.866836][T31282] do_splice_direct+0x342/0x580 [ 1034.866836][T31282] do_sendfile+0x101b/0x1d40 [ 1034.866836][T31282] __se_sys_sendfile64+0x2bb/0x360 [ 1034.866836][T31282] ? kmsan_get_metadata+0x4f/0x180 [ 1034.866836][T31282] __x64_sys_sendfile64+0x56/0x70 [ 1034.866836][T31282] do_syscall_64+0xb0/0x150 [ 1034.866836][T31282] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1034.866836][T31282] RIP: 0033:0x45c1d9 [ 1034.866836][T31282] Code: Bad RIP value. [ 1034.866836][T31282] RSP: 002b:00007fd0980fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1034.866836][T31282] RAX: ffffffffffffffda RBX: 00000000000260c0 RCX: 000000000045c1d9 [ 1034.866836][T31282] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 1034.866836][T31282] RBP: 000000000078bf48 R08: 0000000000000000 R09: 0000000000000000 [ 1034.866836][T31282] R10: 001000007ffff000 R11: 0000000000000246 R12: 000000000078bf0c [ 1034.866836][T31282] R13: 0000000000c9fb6f R14: 00007fd0980fd9c0 R15: 000000000078bf0c [ 1034.866836][T31282] [ 1034.866836][T31282] Uninit was created at: [ 1034.866836][T31282] kmsan_save_stack_with_flags+0x3c/0x90 [ 1034.866836][T31282] kmsan_alloc_page+0xb9/0x180 [ 1034.866836][T31282] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 1034.866836][T31282] alloc_pages_current+0x672/0x990 [ 1034.866836][T31282] push_pipe+0x605/0xb70 [ 1034.866836][T31282] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 1034.866836][T31282] do_splice_to+0x4fc/0x14f0 [ 1034.866836][T31282] splice_direct_to_actor+0x45c/0xf50 [ 1034.866836][T31282] do_splice_direct+0x342/0x580 [ 1034.866836][T31282] do_sendfile+0x101b/0x1d40 [ 1034.866836][T31282] __se_sys_sendfile64+0x2bb/0x360 [ 1034.866836][T31282] __x64_sys_sendfile64+0x56/0x70 [ 1034.866836][T31282] do_syscall_64+0xb0/0x150 [ 1034.866836][T31282] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1034.866836][T31282] ===================================================== [ 1034.866836][T31282] Disabling lock debugging due to kernel taint [ 1034.866836][T31282] Kernel panic - not syncing: panic_on_warn set ... [ 1034.866836][T31282] CPU: 0 PID: 31282 Comm: syz-executor.0 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 1034.866836][T31282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1034.866836][T31282] Call Trace: [ 1034.866836][T31282] dump_stack+0x1df/0x240 [ 1034.866836][T31282] panic+0x3d5/0xc3e [ 1034.866836][T31282] kmsan_report+0x1df/0x1e0 [ 1034.866836][T31282] __msan_warning+0x58/0xa0 [ 1034.866836][T31282] crc32_le_base+0x4d2/0xd10 [ 1034.866836][T31282] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1034.866836][T31282] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1034.866836][T31282] ? __update_load_avg_cfs_rq+0x1a8/0x13b0 [ 1034.866836][T31282] crc32_update+0xb2/0x110 [ 1034.866836][T31282] ? crc32_init+0xd0/0xd0 [ 1034.866836][T31282] crypto_shash_update+0x4e9/0x550 [ 1034.866836][T31282] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1034.866836][T31282] ? crypto_hash_walk_first+0x1fd/0x360 [ 1034.866836][T31282] ? kmsan_get_metadata+0x4f/0x180 [ 1034.866836][T31282] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 1034.866836][T31282] shash_async_update+0x113/0x1d0 [ 1034.866836][T31282] ? shash_async_init+0x1e0/0x1e0 [ 1034.866836][T31282] hash_sendpage+0x8ef/0xdf0 [ 1034.866836][T31282] ? hash_recvmsg+0xd30/0xd30 [ 1034.866836][T31282] sock_sendpage+0x1e1/0x2c0 [ 1034.866836][T31282] pipe_to_sendpage+0x38c/0x4c0 [ 1034.866836][T31282] ? sock_fasync+0x250/0x250 [ 1034.866836][T31282] __splice_from_pipe+0x565/0xf00 [ 1034.866836][T31282] ? generic_splice_sendpage+0x2d0/0x2d0 [ 1034.866836][T31282] generic_splice_sendpage+0x1d5/0x2d0 [ 1034.866836][T31282] ? iter_file_splice_write+0x1800/0x1800 [ 1034.866836][T31282] direct_splice_actor+0x1fd/0x580 [ 1034.866836][T31282] ? kmsan_get_metadata+0x4f/0x180 [ 1034.866836][T31282] splice_direct_to_actor+0x6b2/0xf50 [ 1034.866836][T31282] ? do_splice_direct+0x580/0x580 [ 1034.866836][T31282] do_splice_direct+0x342/0x580 [ 1034.866836][T31282] do_sendfile+0x101b/0x1d40 [ 1034.866836][T31282] __se_sys_sendfile64+0x2bb/0x360 [ 1034.866836][T31282] ? kmsan_get_metadata+0x4f/0x180 [ 1034.866836][T31282] __x64_sys_sendfile64+0x56/0x70 [ 1034.866836][T31282] do_syscall_64+0xb0/0x150 [ 1034.866836][T31282] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1034.866836][T31282] RIP: 0033:0x45c1d9 [ 1034.866836][T31282] Code: Bad RIP value. [ 1034.866836][T31282] RSP: 002b:00007fd0980fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1034.866836][T31282] RAX: ffffffffffffffda RBX: 00000000000260c0 RCX: 000000000045c1d9 [ 1034.866836][T31282] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 1034.866836][T31282] RBP: 000000000078bf48 R08: 0000000000000000 R09: 0000000000000000 [ 1034.866836][T31282] R10: 001000007ffff000 R11: 0000000000000246 R12: 000000000078bf0c [ 1034.866836][T31282] R13: 0000000000c9fb6f R14: 00007fd0980fd9c0 R15: 000000000078bf0c [ 1034.866836][T31282] Kernel Offset: 0x29e00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1034.866836][T31282] Rebooting in 86400 seconds..