0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:02:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442", 0x14}, {&(0x7f0000000900)="8d", 0x1}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 00:02:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837d", 0x66, 0x4000002, 0x0, 0x0) 00:02:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0xa, 0x209e1e, 0x3, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), 0x0}, 0x20) 00:02:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:38 executing program 3: process_vm_writev(0x0, &(0x7f00000041c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 00:02:39 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r3, 0x8200) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x400) sendfile(r1, r2, 0x0, 0x8000fffffffe) 00:02:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837d", 0x66, 0x4000002, 0x0, 0x0) 00:02:39 executing program 0: pipe(0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={0x0}}, 0x0) pipe2$9p(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x21, 0x0, 0xe05c, 0x8, 0x8117, 0x0, 0x7, 0x5, 0x6, 0x80000000], 0x0, 0xa0002}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x26f) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x1) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x3b24, &(0x7f0000000740)=0x0) io_submit(r2, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000780), 0x4000}]) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0xe, 0x1, 0x401, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) 00:02:39 executing program 1: 00:02:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x1c3, 0x0, &(0x7f0000000080)={0x2, 0x4e21, @remote}, 0x10) 00:02:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_opts(r2, 0x0, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 00:02:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837d", 0x66, 0x4000002, 0x0, 0x0) 00:02:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) write$binfmt_elf32(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000b00)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="f364d959e080b125773818ac153bee79603f675fb842bc9f7cec1b43f244dfa34aae7ce70277eb17b97d66acb4bfd78b624ee32354746768eab624e026ba13d0494b91a86d548660e11805f33e20f08a4e1aaed0fd9510c887b24ff0faa9c5bacc59172bd560c6504f15d6706475cddfe9dbd36ce077279577d023ed8e875757133b743317135f7467caaec9d5525cb20563aaac6548e3b121c3", @ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB="3e581d96bdbd718304a81120b2381918380ea61b760362990fb6a5fe0d867b0c70503bb1e9c03485f38bc04b7de25070b879a23ef65e9a57c23f279f6326f96aaff8d20e4fd6e5987946f5410644efb02088ade12bbf2a795a8c1e800759544ecd5b1ad02053947f52875a0a4975979defe2d36cf48b96b3f34cb0a3b196dddb959ac525617c172bd76f4e4667c22e6c99fa6c9e2d8c73789caa0d41280987370ea50aa4cf16563afa02ab170a3019061cbda7af1610d24ee8039a", @ANYRES16, @ANYRES16, @ANYRES64, @ANYRESDEC, @ANYRES32, @ANYRESHEX, @ANYPTR64, @ANYRES16, @ANYRESDEC], @ANYPTR64=&(0x7f00000009c0)=ANY=[@ANYPTR, @ANYRESHEX, @ANYBLOB="64fa41a860d3d28b386118c85673a693cb673c799e6c950486de85604179197a4cfe1dcc4737c583dc7cc2f5a1af8fef10e7c6e4ab341ae60010000000000000358b2b218db58a9ce3e7e1f319132ab8064224e3dc2b0c1d3e0d2c0508a2ec2ee743fbb33fad01fb0587eadd7c6dd1d985b324256c191b959b3b163cb72d21f018b403764034b8f7edd06d574d56b049ee700fd0e2a72b0699f75c566858526ae28fa63f9f41511bd5fa564dac534c4512bface3683f7756b9c82c56210f6d8c4d3802a93645b17620a5247ee0760000", @ANYRESOCT, @ANYPTR]], @ANYBLOB="b7e73a1d2edd3910dcaeab8c30d059d1eb1665345e000000000000800112130be48d7b1397f69b5aee61355b5ec6a8395a8c5a833203757d4fc84e4bf0b72b148861e32ca695734ab0abab5a26801fa1efd10f4b8737e3750602d2721607a8bb4bee07eb9528c12e1e70aa4855b07d989a8c48d11e4c6cafad2067d98fd2c165ef0fa928881fa85e9e023fd6bbb74bece396aa022590ef45c7f4666193d7531ad97c7a77fcece5b04214b12c00b972a44b0fe2fe2233d9fbf99667588930b3b36eb34d34d28fc93050e20e0a27e9032ed8f207747c7cf6c870de9d800e74131b04d3933f77f091980207359d67cfbbbce18c246bd082af616e", @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES64, @ANYRESHEX=0x0, @ANYRESDEC, @ANYBLOB="fdff24650a06d48c6bd1507ae657bb1f27296b74128d3511f702a8958b96836fe7e06a2991b69c692854cbf3e4b0cb77a8bfaf66ce76817c83392eb3df56f646c6788cc3b7a4bc2d2a277469e2cd8e", @ANYRESDEC, @ANYRES32=0x0], @ANYRESHEX], 0xffffff1d) 00:02:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000", 0x69, 0x4000002, 0x0, 0x0) 00:02:39 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r3, 0x8200) sendfile(r1, r2, 0x0, 0x8000fffffffe) 00:02:39 executing program 0: r0 = socket(0x10, 0x80002, 0x0) connect$netlink(r0, &(0x7f0000e8f000)=@proc, 0xc) 00:02:39 executing program 1: 00:02:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000", 0x69, 0x4000002, 0x0, 0x0) 00:02:39 executing program 0: 00:02:40 executing program 3: 00:02:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:42 executing program 1: 00:02:42 executing program 0: 00:02:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000", 0x69, 0x4000002, 0x0, 0x0) 00:02:42 executing program 3: 00:02:42 executing program 2: 00:02:42 executing program 2: 00:02:42 executing program 1: 00:02:42 executing program 0: 00:02:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd00000000", 0x6b, 0x4000002, 0x0, 0x0) 00:02:42 executing program 3: 00:02:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55", 0xdd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:42 executing program 1: 00:02:42 executing program 2: 00:02:42 executing program 0: 00:02:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd00000000", 0x6b, 0x4000002, 0x0, 0x0) 00:02:42 executing program 3: 00:02:42 executing program 1: 00:02:42 executing program 2: 00:02:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd00000000", 0x6b, 0x4000002, 0x0, 0x0) 00:02:42 executing program 0: 00:02:42 executing program 3: 00:02:43 executing program 1: 00:02:45 executing program 1: 00:02:45 executing program 0: 00:02:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55", 0xdd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:45 executing program 3: 00:02:45 executing program 2: 00:02:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x6c, 0x0, 0x0, 0x0) 00:02:45 executing program 0: 00:02:45 executing program 3: 00:02:45 executing program 2: 00:02:45 executing program 1: 00:02:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55", 0xdd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x6c, 0x0, 0x0, 0x0) 00:02:46 executing program 2: 00:02:46 executing program 3: 00:02:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x10000000, [0x174, 0x0, 0x2ff, 0x10], [0x3a]}) 00:02:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x10000000, [0x174, 0x0, 0x11, 0x10], [0x3a]}) 00:02:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030414040900600000000000fff57b016d2763bd56373780398d537500620002591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x6c, 0x0, 0x0, 0x0) 00:02:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f7284b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2c690ccb15322e20000007c7d87a012bf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c4564001e29106fa8cd40e6b02b7dcd2809fe1e135ab17b1fbdf7c2a5fae9acc79f793d07a3a4c1e6544bb07d9d1438733ca9997fb677a0b480f808e1251c0fbac0790ad0cf944599b4b23297e30e613b957bbd0449255697029ec9408003da0c2aca5285838440c370fa8bb7a79b52fe624a56c320517df4ccc52f4b85d0789bba846e52e621a0c5e23e5f564371ad415d53be60a6", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 00:02:46 executing program 2: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x4000003102041ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RWSTAT(r4, 0x0, 0x0) 00:02:46 executing program 3: shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) r0 = gettid() ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) semctl$IPC_RMID(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) creat(0x0, 0x0) semget(0x2, 0x0, 0x0) creat(0x0, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) tkill(r0, 0x1000000000016) 00:02:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') semget$private(0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = gettid() sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f00000000c0)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0xffffffffffffff71, 0x0) r2 = dup(r0) write$P9_RSTATFS(r2, 0x0, 0x12c) tkill(r1, 0x81000000000016) 00:02:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f7284b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2c690ccb15322e20000007c7d87a012bf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c4564001e29106fa8cd40e6b02b7dcd2809", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:02:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0xc0000101}]}) 00:02:49 executing program 3: r0 = memfd_create(&(0x7f0000000440)='de\xe7 ', 0x203) write(r0, &(0x7f0000000040)="1674943d8287f551de60c8a1f9aaa346573167d1e533d99fad3039dd14da5f30c9cc4de858988703870be04f2859f43b1fce9cec187885f78a03b58e46c79162f23905fdd8650c61d5fbdcce9a32e753933ad51fbf2c73f55d3ac5926674e4d7e4cc642e46d0781f65ed15084a1dca743e3e15f2d86e82edd67626c2058db12f1e814a000c2f3970948dc2293c1a3b4e466a4b5fc499015eecf6efd05d9ba0038d08501ffb35cbca1067ed50938c6b315472d96dc88b193800704454b9f79d863660bc0f6528bbea69f105fee34cc9456dbba6c69404c73eac3893844a8464", 0xffffffd3) lseek(r0, 0x0, 0x4) 00:02:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x4d0}]}) 00:02:49 executing program 0: clone(0x2000700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x20000000) unshare(0x20020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RATTACH(r1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 00:02:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3344e8ad3e700e6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0018b, 0x4, 0x0, 0x0, 0x10000000002) r0 = open(0x0, 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x17f) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffa7) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 00:02:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e015", 0xdf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1089.094696][T16989] mmap: syz-executor.4 (16989) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 1089.119429][T16984] input: syz1 as /devices/virtual/input/input8 00:02:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e015", 0xdf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:49 executing program 3: 00:02:49 executing program 2: 00:02:49 executing program 0: 00:02:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x5b, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000c00ffbf, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:02:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:02:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3f, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000200)=""/85) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000240)) syz_open_procfs(0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) rmdir(0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x20) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x481, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x20}, 0x200000000, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x7) syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x0, 0x1c1800) exit(0x200) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 00:02:49 executing program 0: 00:02:49 executing program 2: 00:02:49 executing program 4: 00:02:50 executing program 0: 00:02:50 executing program 2: 00:02:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e015", 0xdf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:52 executing program 3: 00:02:52 executing program 4: 00:02:52 executing program 0: 00:02:52 executing program 2: 00:02:52 executing program 1: 00:02:52 executing program 0: 00:02:52 executing program 3: 00:02:52 executing program 4: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 00:02:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000001c0)) 00:02:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x2c, &(0x7f0000000000)=0x839c, 0x4) 00:02:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000240)=0x7, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) 00:02:52 executing program 3: io_setup(0xb, &(0x7f0000000440)=0x0) io_destroy(r0) io_submit(r0, 0x0, 0x0) 00:02:52 executing program 0: socket$inet6(0xa, 0x8004808000080003, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffa}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) userfaultfd(0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4\x02\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x1a001b00, 0x297ef) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 00:02:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) 00:02:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174, 0x0, 0x400000b7], [0x3a]}) 00:02:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000400)) pipe(0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @aes128, 0x3, [], "ff6a875fe504a2964a91b2e06b66b5f2"}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x20000000fb], 0x1f004, 0x485}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:02:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174, 0x0, 0xc0010140], [0x3a]}) 00:02:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8}, 0x0, 0x0, 0x0, 0x6, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x4b, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000400)) open(&(0x7f00000002c0)='./file0\x00', 0x10000, 0x58) pipe(&(0x7f0000000100)) pipe(0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @aes128, 0x3, [], "ff6a875fe504a2964a91b2e06b66b5f2"}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x20000000fb, 0x0, 0x0, 0x0, 0x0, 0x3f], 0x1f004, 0x485}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:02:53 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/167) 00:02:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 00:02:53 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000300)) 00:02:55 executing program 0: clone(0x1ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80002102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000080)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='ocfs2_dlmfs\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000230000/0x14000)=nil, 0x0) 00:02:55 executing program 3: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/attr/current\x00', 0x2, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/11, 0xa) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) clone(0x1000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETMODE(r0, 0x5601, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 00:02:55 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x960000, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)="100000400600004192e7576d9062ec6e", 0x10}]) 00:02:55 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9d11) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') mknod$loop(&(0x7f0000000100)='./file1\x00', 0x0, 0x1) 00:02:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:55 executing program 2: 00:02:55 executing program 2: 00:02:56 executing program 2: 00:02:56 executing program 4: 00:02:56 executing program 3: 00:02:56 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000000000000000000000e6ffffffffaa54d8aad9d035ec00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000080e8026000000000000000000000073797a31000000000000000000000020000000000000000000000000000000000000000000000000000000000000330000000000000000000000000015a9878a4e96ae19000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000010000000000000004a8dc84b5000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e40206330882bd52f439aa4c7a953ce95147294da372675a3cc3f473eb6824723351a9ddcbe1e2bc7cf8290d9e077e2a31a6ade416baf507608bafeb0507f84ebf947c2517dc7d1556d2a62f000000"], 0x119) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x40008000ffffdffe) 00:02:56 executing program 2: [ 1096.436606][T19717] hid-generic 0000:0000:84DCA804.0001: item fetching failed at offset 0/1 [ 1096.445581][T19717] hid-generic: probe of 0000:0000:84DCA804.0001 failed with error -22 00:02:56 executing program 0: 00:02:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:02:58 executing program 4: 00:02:58 executing program 1: 00:02:58 executing program 0: r0 = gettid() getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001240)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000bac0), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) 00:02:58 executing program 2: 00:02:58 executing program 3: 00:02:59 executing program 2: r0 = gettid() openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000180)) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) tkill(r0, 0x1000000000016) 00:02:59 executing program 4: creat(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) r1 = gettid() setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) flistxattr(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) creat(0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) open(0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) 00:02:59 executing program 3: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffc9a) r0 = gettid() getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12}, &(0x7f0000000080)) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$void(0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, 0x0) ioctl$TIOCMSET(r1, 0x5418, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) tkill(r0, 0x1000000000016) 00:02:59 executing program 1: r0 = gettid() ptrace$getregset(0x4204, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xffa2) socket(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x4000800000012}, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x319) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000001c0), &(0x7f00000000c0)=0x10) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x1000000000016) 00:02:59 executing program 0: socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = gettid() ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) gettid() sched_rr_get_interval(0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) tkill(r0, 0x800000000000014) 00:02:59 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000040), 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x1, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp={0x2c, 0xffffa888, r2}, 0x80, 0x0}}], 0x300, 0x0) 00:03:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:02 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) getpgid(r1) 00:03:02 executing program 4: creat(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) r1 = gettid() setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) flistxattr(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) creat(0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) open(0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) 00:03:02 executing program 1: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00') readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 00:03:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa9\x9d]\xce\xaa#\x87X\xb0\xbf9\n\x9f!A&$F\x86\xfd\x17\x95me\xd0\x19G\bP5\xa4\x05\x00\xb8\xee\xb3X(\x83\xc2\xee8\\\xa5\xb1\x1aed\x94\x9b\xfb\x1d\x1f\xf2\xccr\x0fV\x88\xdf-\xd5N\x1d+ \xa5\xa1Fm\x85\v\xa1\xf87GAV\"%y\xfas\xdd9\x9e\x96R\x16\x19\xa2Y\x92z\xabc\xec\"A\x90\xcf\x83\xf2\xbb\xdb\xe1\xfb\x90JF\xa8\x80\xa9\xe0\xc8\xf3j\x03\xb4\x911.\x86\xcb\xe8\x05\xdd\x1dRV\x9d \x8c\n7\xe6\xb7ys\xcd \xb5\x92\x913\xddV\xb5\xaa\xd8\"\aj(\xe4\xfc}\xcc*\x1a,_\xb7\xf6\xa4SQ\x1c\xb3\xbe\x1e\tK\x9co\x17pR\xb5\"\xb2Jl2\x0f\xd5\xa5v9\xcc\x8c\x98\xb1\xe3\x00\xc6\n#\x82Up#\x96\xd4L\xa6\x00z\xc7\xfaF_\xf5:5\x0f\xb4sQD\x9c\x14?\x04-\xa3\xea9\xd1\xfc\x03z\x86\x14\xa4M\x8fu\xf9\xcb\xe4\xca\xd1\xf6\xba\xbd\x8dM\xb9\xb6\xc8\x94\xf2\v;\xde\xd1\xf0!\f\xb2\x1b\xb3\xba\xcaI=R7\x9c_\xcc\x8eZ\xae\xc5\xc9\x9e\xbdPMpW\xeeNt\x05S&\xdf\t\x98\xe7\xe8#\xa7\xa0\x9f>\x18e\x1c!\x01\xa8\xae-\xc7\xc1\xda#P\x03\xe4\xee\x91\x84\xd9\xf9|4\xb94\xa2\xa2V\x14\xe7\x99\xf1\xafM\xbbT\xa8\x7f\xb8M\x00\xa3X\xae\x996sb\x80M=\xd4\x9af\x8d\x8c\x16b\xe4\xb2\xb5\b\xcd+p\x9c\x88k8:8OD\vo{(\xca\xa8\xb0\x89\x18\xfa\x9f\xf7\t-\xb5\x9a\x06\xccRl\x10\xe8rc\x9a\x9e\xc85u\x7f\xe5\x05\xab\xd29\x1cV\xec\x8e\xda\xe2\xa7gJ\"ia\xb5\x1a\x8f\xb2y,\xcbj7H\x1a\xfb\xb2`z\xd8v\x97\x94\x02^\x84\x10\xf2$\xa9\x8cC\xf8L \xcf]o\xfe\x82j\xdc\xfd\xa7$\xa7\xe2\x9e \x91fj\xea\x03\xaf%\xd90\x9b\x0f\xa2\xee\xcd\xedn!if\xd1=p\f\x8d[\x17\xe7\x86\x8e\xec+\x8a\xe1o\xdbBzS.\x03\xcc\x7f\x16\xe4\xd4\tp\x99\x9d\xca\x81,>M\x1e\xdfn\x96[}\xc1\xdf\xacY$\xc8:\xf9\x9d{\x01)\a\xb2\vY\xf2\x01\x04\xee\x9a\xa2]i\"\x83hm\x12W-,\x1f\xb3{') r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7\x89\xc9B\xab\xe3\xfa\x00\xef\x82\xb1^\x1d\xf5\x03\xcb\xc5\xc2@\xf4\x93\xe5\xd7s\xe4\x0e\x8b\xd2\b\xa9\"\x150\xe7-\x86\xb5\n\xee\xe6\xe8\x12\x0e\xff\xa1:\xc4\xc2\xf3\x84q\xa5\nJ\x1d\xd5\x10\xc8=\xbe\xc8\xdd\xb2r\xff\xa6\x92\xc9\xd9\x0fBNm\xaa\x7f\xd9GO\"2\x18\xf6\xbc\xfc\xac\xa4\x90\xa15\x81B:z\xb7w\x81=A\xd5yr0\r\xa7v\x10d\xb6\xe5Q\xae\xf9W\xc8\x93\xe8\x06O\x87k8I\xa6\xbb\xee\xea\xd0\x14B\xa5D\xa0\x00Q\x88\xc2\xd6\x1f\xcdo\xcb\x13\f{I^\xdc:P\xef\x01\v\x0eRZl\x926eUA\xc4\xe8\xb6\xdb\x99\xda\xf5\x9eE\xde\x11', 0x0, 0x0) preadv(r2, &(0x7f0000000b80)=[{0x0}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x2, 0x2000107c) 00:03:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000bc0)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d", 0x80, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92425a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000003, 0x0, 0x2ad) 00:03:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) 00:03:02 executing program 4: 00:03:02 executing program 0: 00:03:02 executing program 4: 00:03:02 executing program 2: 00:03:02 executing program 0: 00:03:05 executing program 4: 00:03:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:05 executing program 3: 00:03:05 executing program 2: 00:03:05 executing program 1: 00:03:05 executing program 0: 00:03:05 executing program 2: 00:03:05 executing program 1: 00:03:05 executing program 3: fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x3ff}, 0x28, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000440)=ANY=[@ANYBLOB="e175bc7384ca"]) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:03:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000180)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x110220}) 00:03:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x19e8a36fbc883b23}, 0x48) 00:03:05 executing program 1: clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) 00:03:05 executing program 2: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x1ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r3, 0x0) getsockopt$inet6_int(r2, 0x29, 0x37, 0x0, &(0x7f0000000140)) 00:03:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:08 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) pipe(0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000840)={@rand_addr="19cc983e0415648e3da3f9fd366ef258"}) accept$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000009c0)) shmget(0x0, 0x1000, 0x78000000, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_INFO(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:03:08 executing program 4: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) lseek(r0, 0x4200, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xffff}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) fallocate(r1, 0x0, 0x0, 0x7fff) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x8400fffffffa) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:03:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x40000083}]}) 00:03:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x10a}]}) 00:03:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x11e}]}) 00:03:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x480], [0x3a]}) 00:03:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174, 0x0, 0x4b564d03, 0x10], [0x3a]}) 00:03:08 executing program 2: 00:03:08 executing program 3: 00:03:08 executing program 3: 00:03:08 executing program 2: 00:03:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:11 executing program 4: 00:03:11 executing program 3: 00:03:11 executing program 0: 00:03:11 executing program 1: 00:03:11 executing program 2: 00:03:11 executing program 4: 00:03:11 executing program 1: 00:03:11 executing program 0: 00:03:11 executing program 3: socket$inet6(0xa, 0x8004808000080003, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffa}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) userfaultfd(0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4\x02\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x1a001b00, 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001880)='cgroup.type\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 00:03:11 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000040)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x18, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x5, 0x2}]}}}}}}}}, 0x0) 00:03:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1111.658826][T21486] net_ratelimit: 1 callbacks suppressed [ 1111.658860][T21486] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 00:03:11 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000040)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x18, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x4, 0x3, "d9"}]}}}}}}}}, 0x0) 00:03:11 executing program 4: mknod(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000400)='./bus\x00', &(0x7f0000000540)='security.capability\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./bus\x00', &(0x7f0000000000)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='trusted.overlay/origin\x00', 0x0, 0x0, 0x0) 00:03:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) [ 1111.832022][T21523] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 00:03:12 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000040)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x18, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x3, 0x2}]}}}}}}}}, 0x0) 00:03:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$packet(0x11, 0xa, 0x300) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x28, &(0x7f0000000100)=0x2, 0x2c7) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:03:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x2, 0x0, 0x0, 0x8}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000100)=0x4, 0x3b) connect$inet(r1, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:03:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) close(r1) 00:03:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0xfe}]}) [ 1112.371019][T22004] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 00:03:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x8}]}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r3, &(0x7f000000ac80), 0x66, 0x0) 00:03:12 executing program 3: r0 = memfd_create(&(0x7f0000000440)='de\xe7 ', 0x0) write(r0, &(0x7f0000000040)="1674943d8287f551de60c8a1f9aaa346573167d1e533d99fad3039dd14da5f30c9cc4de858988703870be04f2859f43b1fce9cec187885f78a03b58e46c79162f23905fdd8650c61d5fbdcce9a32e753933ad51fbf2c73f55d3ac5926674e4d7e4cc642e46d0781f65ed15084a1dca743e3e15f2d86e82edd67626c2058db12f1e814a000c2f3970948dc2293c1a3b4e466a4b5fc499015eecf6efd05d9ba0038d08501ffb35cbca1067ed50938c6b315472d96dc88b193800704454b9f79d863660bc0f6528bbea69f105fee34cc9456dbba6c69404c73eac3893844a8464", 0xffffffd3) fcntl$addseals(r0, 0x801, 0x1e) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000140)="bc2373e812da70627d6d03bc72cef078284a76b420", 0x15}, {0x0}], 0x2) 00:03:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000680)="b4", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442", 0x14}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) [ 1112.897152][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1112.903366][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1112.976273][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1112.982643][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1112.989245][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1112.995398][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1113.001789][ C0] protocol 88fb is buggy, dev hsr_slave_0 00:03:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:14 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000002c40)={{0x12, 0x1, 0x0, 0x57, 0x5c, 0x1b, 0x40, 0xac8, 0x323, 0x109e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf3, 0xa5, 0x8f}}]}}]}}, 0x0) 00:03:14 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 00:03:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) write$apparmor_current(r0, 0x0, 0x0) 00:03:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 00:03:14 executing program 3: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0x68, &(0x7f0000000000)={{0x18, 0x1, 0x2}, {0x18, 0x1}}, 0x3c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) writev(r0, &(0x7f0000000240), 0x1000000000000295) 00:03:14 executing program 4: 00:03:14 executing program 2: 00:03:15 executing program 0: 00:03:15 executing program 4: 00:03:15 executing program 2: [ 1115.029150][T19717] usb 2-1: new high-speed USB device number 6 using dummy_hcd 00:03:15 executing program 0: r0 = socket(0x10, 0x800000000000803, 0x0) sendto(r0, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000001880)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:03:15 executing program 4: [ 1115.396440][T19717] usb 2-1: New USB device found, idVendor=0ac8, idProduct=0323, bcdDevice=10.9e [ 1115.405655][T19717] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1115.417806][T19717] usb 2-1: config 0 descriptor?? [ 1115.461788][T19717] gspca_main: vc032x-2.14.0 probing 0ac8:0323 [ 1115.666431][T19717] gspca_vc032x: reg_r err -71 [ 1115.671307][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.676811][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.682120][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.687655][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.692952][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.698382][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.703710][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.709151][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.714449][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.720254][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.725583][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.731086][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.736454][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.741748][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.747204][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.752519][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.757921][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.763220][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.768618][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1115.773915][T19717] gspca_vc032x: Unknown sensor... [ 1115.779561][T19717] vc032x: probe of 2-1:0.0 failed with error -22 [ 1115.790406][T19717] usb 2-1: USB disconnect, device number 6 [ 1116.425986][T19717] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 1116.786331][T19717] usb 2-1: New USB device found, idVendor=0ac8, idProduct=0323, bcdDevice=10.9e [ 1116.795589][T19717] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1116.806741][T19717] usb 2-1: config 0 descriptor?? [ 1116.850990][T19717] gspca_main: vc032x-2.14.0 probing 0ac8:0323 [ 1117.057213][T19717] gspca_vc032x: reg_r err -71 [ 1117.061962][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.067514][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.072845][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.078318][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.083656][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.089111][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.094458][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.099969][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.105326][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.110929][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.116537][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.122021][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.127518][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.132962][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.142199][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.147670][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.153072][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.158494][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.163888][T19717] gspca_vc032x: I2c Bus Busy Wait 00 [ 1117.169308][T19717] gspca_vc032x: Unknown sensor... [ 1117.174500][T19717] vc032x: probe of 2-1:0.0 failed with error -22 [ 1117.183749][T19717] usb 2-1: USB disconnect, device number 7 00:03:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:17 executing program 2: 00:03:17 executing program 4: 00:03:17 executing program 0: 00:03:17 executing program 3: 00:03:17 executing program 1: 00:03:17 executing program 2: syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0xe2, 0xa6, 0xc2, 0x8, 0x7fd, 0x4, 0x33e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x2c, 0x6d}}]}}]}}, 0x0) 00:03:18 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 00:03:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r3, &(0x7f0000002d00)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) 00:03:18 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x2, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd\x00') fcntl$notify(r0, 0x402, 0x2c) fchown(r0, 0x0, 0x0) 00:03:18 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) clone(0xf102401ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) 00:03:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1118.316424][T19717] usb 3-1: new high-speed USB device number 2 using dummy_hcd 00:03:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) clone(0x800003102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x2, 0x1, 0x101, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, 0x0) 00:03:18 executing program 4: 00:03:18 executing program 1: 00:03:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1118.576130][T19717] usb 3-1: Using ep0 maxpacket: 8 [ 1118.709709][T19717] usb 3-1: New USB device found, idVendor=07fd, idProduct=0004, bcdDevice= 3.3e [ 1118.718950][T19717] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1118.730145][T19717] usb 3-1: config 0 descriptor?? [ 1118.771769][T19717] usb 3-1: Waiting for MOTU Microbook II to boot up... [ 1118.779512][T19717] usb 3-1: failed setting the sample rate for Motu MicroBook II: -22 [ 1118.787927][T19717] snd-usb-audio: probe of 3-1:0.0 failed with error -22 [ 1118.969894][T19717] usb 3-1: USB disconnect, device number 2 [ 1119.735974][T19717] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 1119.985941][T19717] usb 3-1: Using ep0 maxpacket: 8 [ 1120.106286][T19717] usb 3-1: New USB device found, idVendor=07fd, idProduct=0004, bcdDevice= 3.3e [ 1120.115511][T19717] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1120.125383][T19717] usb 3-1: config 0 descriptor?? [ 1120.171182][T19717] usb 3-1: Waiting for MOTU Microbook II to boot up... [ 1120.178325][T19717] usb 3-1: failed setting the sample rate for Motu MicroBook II: -22 [ 1120.186697][T19717] snd-usb-audio: probe of 3-1:0.0 failed with error -22 [ 1120.369589][T12721] usb 3-1: USB disconnect, device number 3 00:03:20 executing program 2: 00:03:20 executing program 0: 00:03:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:20 executing program 4: 00:03:20 executing program 1: 00:03:20 executing program 3: 00:03:21 executing program 1: [ 1120.957995][T23628] cgroup: fork rejected by pids controller in /syz5 00:03:21 executing program 3: 00:03:21 executing program 0: 00:03:21 executing program 2: 00:03:21 executing program 4: 00:03:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r2, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) 00:03:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) 00:03:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000080)={0x39, 0x6, 0x0, {0x0, 0x0, 0x10, 0x0, '/selinux/policy\x00'}}, 0x39) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xe1}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[], 0x1}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:03:21 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) dup(0xffffffffffffffff) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000e530e9)=""/16, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpgid(0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) gettid() getpid() ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r2}, 0x30) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$inet6(0xa, 0x0, 0x0) 00:03:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f7284b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2c690ccb15322e20000007c7d87a012bf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c4564001e29106fa8cd40e6b02b7dcd2809fe1e135ab17b1fbdf7c2a5fae9acc79f793d07a3a4c1e6544bb07d9d1438733ca9997fb677a0b480f808e1251c0fbac0790ad0cf944599b4b23297e30e613b957bbd0449255697029ec9408003da0c2aca5285838440c370fa8bb7a79b52fe624a56c320517df4ccc52f4b85d0789bba846e52e621a0c5e23e5f564371ad415d53be60a6b363f0ffd8f0040f18a35a15c3ac24e3dad88bb1363129b259c596e36308b61ba099429ee68f675f23074467cdc4404ad444", 0x129}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:03:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:21 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/netstat\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 00:03:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:21 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000600)=""/11, 0x232) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) connect$inet6(r1, &(0x7f0000000000), 0x1c) futex(&(0x7f0000000540), 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x0, 0x0) 00:03:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x8fe) 00:03:22 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) r2 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, 0x0) 00:03:22 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) r2 = dup2(r1, r0) ioctl$VT_GETSTATE(r2, 0x5603, 0x0) 00:03:22 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/netstat\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 00:03:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x13217e) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, 0x0, 0x0) 00:03:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:22 executing program 0: clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 00:03:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="0d00000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24dd620b2022d5ad63b369aaffe9a6b608a5fece0eca95d71f2d3e60613a027fb50cbcbd92944076d3b97247e066005ccf1032f51d36ab231f6c20d87e91eed2f2db4734535e0293b467edf69776dca67d90a17ccd18fb9cff00000078e382dcf296a23a060b81e1bc48d6854b8f54b55d8b334420", 0xbe}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="0900000000003639408fa3a3ba27660199783b0a82f79b32a7c8226a86600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24fd620b2022d5ad63b369d8ab0193d3d9b4b7f5393ab95d95cf2673b887d722239e4f7b", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)="25101fb9f182dc3d70e0ca1a9c813769ed16bba8f900ae75996aec9e7305648a98ac91bc997460d0fbdc80368555a0cdf6600d60ccd2a4c7d35e656e2826a7cda1f80da067f12b8d18f96f7701de2bba27ab9b34399676ac9953961daefda438c512b1c4b65ec980d4c2fd5277175cee8ee33d484c758c5c86c4d09315b79755bb537447f13d4de55542123736acca854759f18b98febfe18dd07937f5925e0af665cf03ad1152895586d8182afa1fd883073e0449ccf9682430b3cc0e2c7a54bb0e131710f9eaf58bee7304fc6e948a9541453d18e9ff8e35bd5bb2f9", 0xdd}, {&(0x7f0000000300)="20a3c8e273be", 0x6}], 0x2}}], 0x1, 0x0) 00:03:23 executing program 1: epoll_create1(0x80000) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x7) 00:03:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000011c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}], 0x1, 0x0) 00:03:23 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:03:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:23 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f00000000c0), 0x2c8, 0x0) 00:03:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:03:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:23 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 00:03:23 executing program 3: open(0x0, 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0xffffffffffffff50) r0 = gettid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000100)) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) eventfd2(0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) semget(0x0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 1123.797678][ T31] audit: type=1326 audit(1572739403.853:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25280 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:03:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000003639405cb4aed14e0000000070fe4763ef4f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e6519961560767e586f6fef457062c6a8708106d963916047d7b6ff300c275de915c5503a276b43ddb3b5554d16f81e39aac4e7af1", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@get={0x1, &(0x7f0000000240)=""/153, 0x3}) 00:03:24 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/68, 0x44) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) 00:03:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x309) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:03:24 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) r2 = dup2(r1, r0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, 0x0) 00:03:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1124.515243][ T31] audit: type=1326 audit(1572739404.563:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25280 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:03:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x309) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6=@rand_addr="14935184abfd4251b700d110485b21fc"}}, 0xe8) 00:03:24 executing program 0: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x8985243ef8fe7a57) 00:03:24 executing program 2: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-se\xecf/attr/current\x00', 0x2, 0x0) 00:03:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:24 executing program 4: 00:03:24 executing program 3: 00:03:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:25 executing program 2: 00:03:25 executing program 0: 00:03:25 executing program 4: 00:03:25 executing program 3: 00:03:25 executing program 2: 00:03:25 executing program 1: 00:03:25 executing program 0: 00:03:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:25 executing program 4: 00:03:25 executing program 2: 00:03:25 executing program 3: 00:03:25 executing program 2: 00:03:25 executing program 0: 00:03:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:25 executing program 1: 00:03:25 executing program 3: 00:03:25 executing program 4: 00:03:25 executing program 2: 00:03:25 executing program 3: 00:03:25 executing program 0: 00:03:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:25 executing program 1: 00:03:25 executing program 4: 00:03:26 executing program 2: 00:03:26 executing program 3: 00:03:26 executing program 1: 00:03:26 executing program 0: 00:03:26 executing program 4: 00:03:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:26 executing program 2: 00:03:26 executing program 1: 00:03:26 executing program 0: 00:03:26 executing program 4: 00:03:26 executing program 2: 00:03:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:26 executing program 3: 00:03:26 executing program 0: 00:03:26 executing program 1: 00:03:26 executing program 4: 00:03:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/68, 0x44) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x1, 0x1b) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) 00:03:26 executing program 2: ftruncate(0xffffffffffffffff, 0xfffffffffffffffa) 00:03:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="edcd6635", 0x4}], 0x1}}], 0x1, 0x0) 00:03:26 executing program 1: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r0 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000002) fcntl$dupfd(r1, 0x0, r2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) fcntl$setstatus(r2, 0x4, 0x2000) set_thread_area(&(0x7f0000000080)={0x0, 0x0, 0x2000, 0x1, 0x2}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0xa) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) write$char_usb(r3, &(0x7f00000002c0)=':', 0x1) tkill(r0, 0x13) 00:03:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001a0007041dfffd946f61050002000300fe0200000001080008000200ac14140e", 0x24}], 0x1}, 0x0) 00:03:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@broadcast, @link_local, [{}], {@ipv6={0x86dd, {0x0, 0x6, "a1bba9", 0xfffffffffffffd34, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000]}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[], @gre={{0x0, 0x501, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xf7}}}}}}}, 0x0) 00:03:27 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) acct(0x0) 00:03:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:27 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000016) tkill(r0, 0x1000000000016) tkill(r0, 0x9) 00:03:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:03:27 executing program 0: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) msgrcv(r0, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESHEX, @ANYRES16=0x0], @ANYRES32=r1, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESDEC, @ANYRES32, @ANYRESOCT, @ANYRES16]], 0x3, 0x3, 0x0) msgsnd(r0, &(0x7f0000000340)={0x3}, 0x0, 0x0) 00:03:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) inotify_init1(0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="2b7069647320412c5ec7b5d90762f8ba9fe8ee7e083311af7cb115b708409b4e9206cb06735d6d1ff4ad468b64ac46bb6f6aee300fb8e7572bcd829a59c00400000000000000c8818253da71fa1b6b4ed383c004ca276a756a0e6e7c9bda4107b37664c98904cb9639bf4b91"], 0x6c) setxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v1={0x1000000, [{0x7, 0x6}]}, 0xc, 0x2) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) syz_emit_ethernet(0x66, &(0x7f0000000180)=ANY=[@ANYBLOB="2174a48ab595ffffffffffff86dd604c000f00303a00fe800000000000000000000000000000ff0200070000000000000000000000010200907800000000200000800000000000000000000000000000000000000000ff02000000e709d53100000000000f003e59bb373371a9d9f0e4ce0300ed5e656936a11960f228ef54d00846aafb061a1bfaa8adaeaa7a4e9be077ffb7fd63c6f81a98abe75f0bcb40fabc2f2178d1125cd0fec848d5eb6e31382c7c75ec4e9a2d64a090f0fa192d5946f15be65d4a14672c115a057ad7bf5a6afcbe9fcae9082f"], 0x0) [ 1127.457137][ C1] net_ratelimit: 5 callbacks suppressed [ 1127.457159][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1127.469376][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:03:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x309) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001ac0)={{{@in=@local, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@empty}}, 0xe8) 00:03:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:27 executing program 1: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r3, 0x0) read(r1, &(0x7f0000000000)=""/250, 0x128b9372) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 00:03:27 executing program 0: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) msgrcv(r0, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESHEX, @ANYRES16=0x0], @ANYRES32=r1, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESDEC, @ANYRES32, @ANYRESOCT, @ANYRES16]], 0x3, 0x3, 0x0) msgsnd(r0, &(0x7f0000000340)={0x3}, 0x0, 0x0) 00:03:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) close(r0) 00:03:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, 0x0}], 0x1, 0xcffa808b513f9ded, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:03:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc0a00e9bfde51afe9c81a9ced5725caf1cae63487d70c028dcde5c0198e4796e2b7185ad1a3f4bdffe1482d4c3e32cc4a2d5f302b0f5b990ca09d46b0358b0d3b1c1ae1c300000000fd4e0924d9c39bcc11e95474c2e0c1054fb66ebd48b032ec5348e2a670250f103ede36b06403c0728c34583978459f88d237b2c010785b0e12aff3e0a6fccbf013f41eea28963fc937c32042b9f563492df08c3a91d03191e6fc0e988b918c216166373817b23099c30f081e4d4dd05041855dd658"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x6e}, 0x48) 00:03:28 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x3000000000016) 00:03:30 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_opts(r3, 0x0, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 00:03:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x1c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:03:30 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) 00:03:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 00:03:30 executing program 2: socket$netlink(0x10, 0x3, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x37}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:30 executing program 4: socket$inet6(0xa, 0x2, 0x0) 00:03:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(r0, 0x0, r0) dup2(r2, r1) getsockopt$inet6_mreq(r1, 0x29, 0x1, 0x0, &(0x7f0000005b40)) 00:03:30 executing program 0: 00:03:30 executing program 2: 00:03:30 executing program 2: 00:03:30 executing program 0: 00:03:31 executing program 3: 00:03:31 executing program 4: 00:03:31 executing program 1: 00:03:31 executing program 0: 00:03:31 executing program 2: 00:03:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:03:31 executing program 3: 00:03:31 executing program 4: 00:03:31 executing program 1: 00:03:31 executing program 0: 00:03:31 executing program 2: 00:03:31 executing program 3: 00:03:31 executing program 4: 00:03:31 executing program 0: 00:03:31 executing program 1: 00:03:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0xf4, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0x0, 0x9}) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090ea0f2cadc000000000046661e177f2c728600000a000000000000008000000000000000000000210000dfffff000000000000000200010001000000000000edfffd000005"], 0x49}}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:31 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f000000fff8)='./file0\x00', 0x0, 0x7ffbf, 0x0) utimes(&(0x7f0000000000)='./file0\x00', 0x0) 00:03:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:03:34 executing program 4: r0 = socket$inet6(0xa, 0x803, 0xff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@empty, 0x0, 0x1}, 0x20) 00:03:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020300001300000001000000000000000500060000d000000a0000000000000000000000000000000000000000000000040000000000000005001a00fe8000000000000000000000000000bbe0000002000000000000000000000000040020000200010000000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000ffff0300000000000089029e8bb60be1fb9cd8de093efcfd519d405b453366f8970f93354c41b1ef29a207964de5559cca8a58915fdb"], 0x98}}, 0x0) 00:03:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newlink={0x34, 0x12, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 00:03:34 executing program 2: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0xdf3, 0xfffffffd}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffd83) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 00:03:34 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:03:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x7fffffff}, 0x8, 0x0) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x577}], 0x2000000000000287) timer_create(0x4000000000000003, &(0x7f000004c000)={0x0, 0x19, 0x0, @thr={0x0, 0x0}}, &(0x7f000004cffc)) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x7}}, 0x0) creat(0x0, 0x0) 00:03:34 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4c6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) ptrace$getregset(0x4204, r2, 0xc6aca5ec4c9455db, &(0x7f00000000c0)={&(0x7f0000000400)=""/4096, 0x1000}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffffffff, 0x7200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x2, 0x1, 0x3, 0x5, 0xffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x7) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_emit_ethernet(0x2a, &(0x7f00000003c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_request={0x11, 0x0, 0x0, 0x3}}}}}, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x4001) 00:03:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)={'syz0'}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 00:03:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write$FUSE_POLL(r0, 0x0, 0x0) shutdown(r1, 0x0) 00:03:34 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r0, r1, 0x0, 0x88001) 00:03:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f0000000140)='G\xc3$\x05ju\xc3PL\x00\x94\xf7\x1a#\x85x\xa2Br{\xf8\xff\xff\xff\xff\xff\xff\xffk\x9d\xde\xf2\x01\x00\x00\x00\x00\x00\x00\x00c(\xf2]\x1d', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:03:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:03:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) signalfd(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000200)) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req={0x0, 0x0, 0x4}, 0x10) socket$netlink(0x10, 0x3, 0x0) r3 = creat(0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_GET(r3, 0x0, 0x40) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000}, 0x8004) r4 = perf_event_open(&(0x7f0000001ec0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={0xffffffffffffffff, &(0x7f0000000300), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r6, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r7, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r8, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r8, &(0x7f0000000240), 0x0}, 0x20) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="a4134950a9f973fac343581018b2a8421da1b9d8243c6ac10f6eab00416294d757e687e22055ccfb9828c467b9c91025a86772ff1d629af198b3d3a6d773dce9439df278be7f76150a9968beab9e62f8279bc5becb26e1b22afa", 0x5a}, {&(0x7f00000001c0)='j3', 0x2}, {0x0}, {0x0}, {&(0x7f0000000400)}, {0x0}, {&(0x7f00000004c0)="b1194fa22d9c0fcea7677d777f2f1cf77826aed1787c8d513a4e0a8254280c97df9756021e07ab8aedb91bc28e0706d955528a02c2bce6932d1aaea3", 0x3c}, {0x0}], 0x8}, {&(0x7f0000000780)=@abs={0x2, 0x0, 0x4e24}, 0x6e, &(0x7f0000001a40)=[{0x0}], 0x1, &(0x7f0000001d80)=ANY=[@ANYBLOB="2000000001000100e5", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32=r5], 0x31, 0x4000010}, {&(0x7f0000001b40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001cc0)=[{0x0}, {&(0x7f0000001c00)="94228637e00ef44c4a702ec59227d35270be1791866714d0a418c772b529c97d46c7a7096df04b95fe9753a43b9de801fc46f194490e93ec47fa9cd3e4b80f7476166d82fe5821ef49b69f2d67387b6823d98e3851641e5c7fc1", 0x5a}, {&(0x7f0000001c80)}], 0x3, 0x0, 0x0, 0x80000c1}], 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) 00:03:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x1600bd77, 0x0, 0x0) 00:03:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, 0x0, 0x0) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, 0x0, 0x20000, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x0) write$binfmt_script(r3, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1f, 0xd8402) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000100)={0xab4a, 0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000200)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f00000001c0)='nodev\\]@\x00', &(0x7f0000000240)) keyctl$setperm(0x5, r4, 0x20000000) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000080)=@chain={'key_or_keyring:', r4, ':chain\x00'}) getpid() tkill(0x0, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@multicast2, @in=@multicast2, 0x4e24, 0x3, 0x4e20, 0x6, 0xa, 0x0, 0x0, 0x32, 0x0, r5}, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x743234ab, 0x7}, {0xfffffffffffffb09, 0x6, 0x5, 0x8000}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@multicast2}, 0x2, @in=@loopback, 0x0, 0x0, 0x3, 0x81, 0x100, 0x1f, 0xffffffff}}, 0xe8) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x1d3) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f00000004c0)={0x3, 0x0, [{0x10000, 0xf1, &(0x7f00000002c0)=""/241}, {0x0, 0xaf, &(0x7f00000003c0)=""/175}, {0x2000, 0x3e, &(0x7f0000000480)=""/62}]}) ptrace$setopts(0x4206, r1, 0x0, 0x0) 00:03:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f0000000140)='G\xc3$\x05ju\xc3PL\x00\x94\xf7\x1a#\x85x\xa2Br{\xf8\xff\xff\xff\xff\xff\xff\xffk\x9d\xde\xf2\x01\x00\x00\x00\x00\x00\x00\x00c(\xf2]\x1d', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:03:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0xae, &(0x7f0000000080)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x78, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x4000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @loopback, [@dstopts={0x0, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @routing={0x0, 0x1, 0x0, 0x0, 0x0, [@empty]}]}}}}}}}, 0x0) [ 1137.356466][T26913] IPv6: addrconf: prefix option has invalid lifetime 00:03:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)='L', 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 00:03:37 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e00000027f0000010100000002000000e00000017f000001782e022e5695b9003a2f6708f0729db387e83aa57ca90319b782e7cd53e357c9d92727dec615e36dccb4bdc2122af093e9e87869228bcbb9779ce68cb2d02ea14a68a34c6b0dd6c9aa9350c035e5419afbbc7c0dbbfa5e2c677f21dd7562cb74008cc51aee2913be315c8d3e7f8502cc1c9661b7453f0320d7e4ce78b4702500a3563d00fa4bff07000041522245394f63b1eaa8ce53570b3eda88ba0074802ef992e6503f37425139e67b15aa1fe15a8f000bbf2aaf10183beee184475100000000000000c6c34141463c873678887bc0116685d0c18a8e3b20945468293149bc4addbebcf98920c131be56d182d07586cda3df5dc1dfb88df5b27dc121b7117c54f3487aca2a70e25fb891fe3c99fd559b0e547920624fcd4d548610f27cf6602db292e0e81060c380da114f7cceb80c8c69a89b3d550b9ca98c75b9ffd9433bb8cc91c891ae55afbf6ef202fb96eb2210cd54a45e1843f07187fb3a51256c975a385720ea530aafb6c055ac797b33e335799d2022b5338eabf28ed71899bbb2084fd9f4fa374a98ea17cb2d965f8aecc3f7c0e698436e2f45f8ddf8d9d7c0e84b00afc74e87d5e3ed205afcf57a95c32ad270ffaeee9dba5e79495f30916ffbed7ca7f11974041d1bdbd3185c6f7862b6b817547a792499eb6a205ed523aeb3252fecd223ff277996b5270ec5feb61e453847bc440587024c7cb1d99fc3e0702db389d4db4770a1422539a232775d7a"], 0x18) 00:03:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a48b1bf72801002b4d2f2fc64fad273bd48741aacbe8802ada191ea3e46f905080af4c90ccb15322e2df00000000000000960f530000010000000000772cf2ee001f6c9ad54ac45a4a0c245dd58849963e", 0x51}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:03:37 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getrandom(&(0x7f00000018c0)=""/66, 0x42, 0x2) 00:03:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x12, 0x0, 0x0) [ 1137.709051][T26938] ptrace attach of "/root/syz-executor.2"[26937] was attempted by "/root/syz-executor.2"[26938] 00:03:37 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f7284b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2c690ccb15322e20000007c7d87a012bf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c4564001e29106fa8cd40e6b02b7dcd2809fe1e135ab17b1fbdf7c2a5fae9acc79f793d07a3a4c1e6544bb07d9d1438733ca9997fb677a0b480f808e1251c0fbac0790ad0cf944599b4b23297e30e613b957bbd0449255697029ec9408003da0c2aca5285838440c370fa8bb7a79b52fe624a56c320517df4ccc52f4b85d0789bba846e52e621a0c5e23e5f564371ad415d53be60a6b363f0ffd8f0040f18a35a15c3ac24e3dad88bb13631", 0x10d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1137.941628][T26957] ptrace attach of "/root/syz-executor.1"[26956] was attempted by "/root/syz-executor.1"[26957] 00:03:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:03:40 executing program 4: 00:03:40 executing program 1: 00:03:40 executing program 0: 00:03:40 executing program 2: 00:03:40 executing program 3: 00:03:40 executing program 3: 00:03:40 executing program 2: 00:03:40 executing program 0: 00:03:40 executing program 4: 00:03:40 executing program 1: 00:03:40 executing program 4: clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x8) syz_open_procfs(0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x4}, 0x14) 00:03:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:03:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@multicast2, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 00:03:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="dfbc58ef6edd8c56a5017ead7279f601", 0x10) r3 = accept(r2, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000002a00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="0f", 0x1}], 0x1}}], 0x3fffffffffffdf5, 0x0) 00:03:43 executing program 2: 00:03:43 executing program 3: 00:03:43 executing program 4: 00:03:43 executing program 3: 00:03:43 executing program 4: 00:03:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000140)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x11, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x4000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x5, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @remote}}}}}}}, 0x0) 00:03:43 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='net/packet\x00') r0 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = getpid() ioprio_set$pid(0x2, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0xffffff49, 0xfe, 0x52, 0x4, 0x0, 0x0, 0x400, 0x10815, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00005ff000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket(0x0, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="080100004a02000000000000000000000000000000000000050000000000c62fb1c206fed5ee5c7b44e37e95ece9"], 0xfdef) connect$inet6(r2, 0x0, 0x62) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x16c, 0x244) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000540)={@in={{0x2, 0x0, @local}}, 0x0, 0x200000000000025, 0x2, "a77760f5a7645bc43c241d69912d030c43244947a79015f0fe57917cb62a939a7a939ebddfce7bbba4fec2d82818a17900"}, 0xd8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) pipe(0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000002340)=""/4096, 0x4890}], 0x1, &(0x7f0000000200)=""/20, 0x148, 0x93de}, 0x0) write$binfmt_elf64(r3, &(0x7f0000000500)=ANY=[], 0xffffffdf) 00:03:43 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000140)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x4000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x2, 0x0, 0x0, @mcast1={0x5, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @remote}}}}}}}, 0x0) 00:03:43 executing program 2: mkdir(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000001240)='/dev/zero\x00', 0x100840, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) bind$inet6(0xffffffffffffffff, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x10) write(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x7, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:03:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)={0x1, 0x0, [{0x0, 0x2, 0x0, 0x0, @msi}]}) 00:03:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750b7489e2fac8a86f0298e55e01579", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:03:46 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg$inet6(r0, &(0x7f00000004c0)={&(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@dontfrag={{0x14}}], 0x18}, 0x0) 00:03:46 executing program 4: syz_open_procfs(0x0, &(0x7f0000000100)='net/packet\x00') r0 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = getpid() ioprio_set$pid(0x2, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0xffffff49, 0xfe, 0x52, 0x4, 0x0, 0x0, 0x400, 0x10815, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00005ff000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket(0x0, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="080100004a02000000000000000000000000000000000000050000000000c62fb1c206fed5ee5c7b44e37e95ece9"], 0xfdef) connect$inet6(r2, 0x0, 0x62) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x16c, 0x244) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000540)={@in={{0x2, 0x0, @local}}, 0x0, 0x200000000000025, 0x2, "a77760f5a7645bc43c241d69912d030c43244947a79015f0fe57917cb62a939a7a939ebddfce7bbba4fec2d82818a17900"}, 0xd8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) pipe(0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000002340)=""/4096, 0x4890}], 0x1, &(0x7f0000000200)=""/20, 0x148, 0x93de}, 0x0) write$binfmt_elf64(r3, &(0x7f0000000500)=ANY=[], 0xffffffdf) 00:03:46 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000200)={0x0, 0x5}) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_]Sm\x98:#\"\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04m\x89\x0e4\xe6\x1d]\xb3\xd9iO=\r=\x92\x89\x16~\xf4\xf7\xf9\x00\x00\x00\x00\xe1\xff\xff\xff\xff\xff\xff\x01') 00:03:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) 00:03:46 executing program 1: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)=']\x9dL\x00', 0x0) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:03:46 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 00:03:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x100384, 0x0) ioctl$BLKPG(r2, 0x40140921, &(0x7f0000001200)={0x0, 0x9, 0x0, 0x0}) 00:03:46 executing program 1: 00:03:46 executing program 3: 00:03:47 executing program 2: 00:03:47 executing program 3: 00:03:49 executing program 4: 00:03:49 executing program 0: 00:03:49 executing program 1: 00:03:49 executing program 2: 00:03:49 executing program 3: 00:03:49 executing program 5: 00:03:49 executing program 0: 00:03:49 executing program 1: 00:03:49 executing program 2: 00:03:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000100)='net/packet\x00') r0 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = getpid() ioprio_set$pid(0x2, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0xffffff49, 0xfe, 0x52, 0x4, 0x0, 0x0, 0x400, 0x10815, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00005ff000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket(0x0, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r2, 0x0, 0x62) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000540)={@in={{0x2, 0x0, @local}}, 0x0, 0x200000000000025, 0x2, "a77760f5a7645bc43c241d69912d030c43244947a79015f0fe57917cb62a939a7a939ebddfce7bbba4fec2d82818a17900"}, 0xd8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) pipe(0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000002340)=""/4096, 0x4890}], 0x1, &(0x7f0000000200)=""/20, 0x148, 0x93de}, 0x0) write$binfmt_elf64(r3, &(0x7f0000000500)=ANY=[], 0xffffffdf) 00:03:49 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000013) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x20000000, 0x4000000000003, 0x0, @thr={0x0, 0x0}}) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000180)) ioctl$BLKTRACETEARDOWN(r0, 0x801012f0, 0x0) 00:03:50 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0x108000400000003a) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000000)={@mcast1, 0x0}, &(0x7f0000000100)=0x14) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0xe) r4 = accept4(0xffffffffffffffff, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000240)=0x80, 0x79ff900e26dfb1ce) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r8}]}, 0x28}}, 0x0) r9 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r12, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r13}]}, 0x28}}, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r16 = accept4(0xffffffffffffffff, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000240)=0x80, 0x79ff900e26dfb1ce) sendmsg$netlink(r16, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000c1}, 0x48041) accept4$packet(r16, &(0x7f0000002ac0), &(0x7f0000002b00)=0x14, 0x0) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockopt$inet_mreqn(r17, 0x0, 0x1412e645038b7e9f, &(0x7f0000002cc0)={@dev, @remote}, &(0x7f0000002d00)=0xc) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket(0x0, 0x0, 0x0) bind(r19, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001e0001020000000000000000070000001e81eb79d67cdc65ecd802fcdf0ac300351a129fa2439a9a83abc5da4673eea2e53bd4fbbd8f3a27d06049886e41753ea71ddd70ec32550a7709e5163c3ef80cee6b7992fc02dd345966cc70f304450a4e732f349f5ae32e96660d7156991126e965a197c7f6f75b8c83bcad97b5c02cb5519b1e77c3c347e72ff6f03b8edd24bba1eb597deb1f27258a9671fe936ace56fce5eef5d4cc222ba3bfe6f020775a5cb5a13d766ea92c770f03514aa1c9b564b9d4c1d66a806f28e0fa4ff022fb68c99eef3f4d0820f8b23d48896401", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r20], 0x28}}, 0x0) r21 = socket(0x11, 0x800000003, 0x0) bind(r21, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r21, 0x0, &(0x7f0000000140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x30044001}, 0xc, &(0x7f0000003300)={&(0x7f0000002d40)={0x474, r5, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x48, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x0, 0x0, 0x80, 0x1000}, {0x3, 0x9, 0x0, 0xffffffe1}]}}}]}}, {{0x8}, {0xec, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffa}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}]}}, {{0x8, 0x1, r13}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x134, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7c}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8}, {0xc0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r3}}}]}}, {{0x8}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r3}}}]}}]}, 0x474}, 0x1, 0x0, 0x0, 0x1}, 0x4) sendmsg$netlink(r4, &(0x7f0000001a40)={&(0x7f0000000340)=@kern={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x0, 0x0, 0x0, 0x40000c1}, 0x48041) setsockopt$ALG_SET_AEAD_AUTHSIZE(r4, 0x117, 0x5, 0x0, 0x9) 00:03:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'dummy0\x00', 0x0}) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000000000)) 00:03:50 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x2fffffd, 0x8d071, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x8bb786a5a1b4797e, 0x4ca32, 0xffffffffffffffff, 0x0) 00:03:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x80) 00:03:50 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) 00:03:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000100)={0x18, 0x1, 0x0, {0xccc}}, 0x18) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x4e23, @dev}, 0x10) r3 = open(&(0x7f0000000180)='./file0\x00', 0x400, 0x100) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000001c0)={0x7, 0x80}) r4 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x48, &(0x7f00000000c0)={@mcast1}, 0xc8) getsockopt$sock_buf(r4, 0x1, 0x1c, &(0x7f0000000300), &(0x7f0000000340)) sendto$inet(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0903", 0x2) sendto$inet(r2, &(0x7f0000000000), 0xffffffffffffffb5, 0xc0, 0x0, 0xfeffffff00000000) sendto$inet(r2, &(0x7f00000004c0)="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", 0x1000, 0x22008010, &(0x7f0000000140)={0x2, 0x4e21, @loopback}, 0x10) ioprio_set$pid(0x2, 0x0, 0x7e39) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) dup3(r5, r6, 0x0) [ 1150.256687][T27109] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 00:03:50 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x3) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x71a000) [ 1150.421135][T27117] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 00:03:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x500}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:03:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x11, 0x2, 0x0, &(0x7f0000000040)) 00:03:50 executing program 4: syz_emit_ethernet(0x6e, &(0x7f0000000180)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @multicast1}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x8, 0x0, [], "c4a644fc4eba03bf"}}}}}}, 0x0) 00:03:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) poll(0x0, 0x0, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x100000078, 0x0, 0x0, 0x800e00515) r2 = dup(r0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xe8e4, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) shutdown(r2, 0x0) 00:03:51 executing program 0: 00:03:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00961) 00:03:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020a00800200000000000000e8000000c698c755f0056f177c4fce6ee056a8526fc706e8812a11"], 0x10}}, 0x0) 00:03:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=@bridge_getneigh={0x20, 0x1e, 0x2f51ad2c79f29095, 0x0, 0x0, {0x2, 0x2}}, 0x20}}, 0x0) 00:03:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:03:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@delsa={0x3c, 0x11, 0x101, 0x0, 0x0, {@in=@loopback}, [@srcaddr={0x14}]}, 0x3c}, 0x8}, 0x0) 00:03:54 executing program 1: 00:03:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:03:54 executing program 1: 00:03:54 executing program 2: 00:03:54 executing program 4: 00:03:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:03:54 executing program 1: 00:03:54 executing program 2: 00:03:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:57 executing program 4: 00:03:57 executing program 2: 00:03:57 executing program 1: 00:03:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) sendmmsg(0xffffffffffffffff, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:03:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:57 executing program 1: 00:03:57 executing program 4: 00:03:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) sendmmsg(0xffffffffffffffff, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:03:57 executing program 2: 00:03:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e808190b21d2dcd1f0841b502934bf750", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:03:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0101282, 0x0) 00:03:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) sendmmsg(0xffffffffffffffff, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:03:57 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CTX(r0, 0x541b, 0x0) 00:03:57 executing program 4: write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0285629, &(0x7f0000000080)) 00:03:57 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000300)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0x5646, 0x0) [ 1157.615186][T27243] Sensor A: ================= START STATUS ================= [ 1157.623586][T27243] v4l2-ctrls: Sensor A: Test Pattern: 75% Colorbar [ 1157.630379][T27243] v4l2-ctrls: Sensor A: Vertical Flip: false [ 1157.636521][T27243] v4l2-ctrls: Sensor A: Horizontal Flip: false [ 1157.642735][T27243] v4l2-ctrls: Sensor A: Brightness: 128 [ 1157.648420][T27243] v4l2-ctrls: Sensor A: Contrast: 128 [ 1157.653838][T27243] v4l2-ctrls: Sensor A: Hue: 0 [ 1157.658796][T27243] v4l2-ctrls: Sensor A: Saturation: 128 00:03:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab3", 0x40}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1157.664419][T27243] Sensor A: ================== END STATUS ================== 00:04:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000180)={0x20071026}, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000640)='setgroups\x00') 00:04:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f7284b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2c690ccb15322e20000007c7d87a012bf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c4564001e29106fa8cd40e6b02b7dcd2809fe1e135ab17b1fbdf7c2a5fae9acc79f793d07a3a4c1e6544bb07d9d1438733ca9997fb6", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:04:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) [ 1160.167931][T27256] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure 00:04:00 executing program 1: finit_module(0xffffffffffffffff, &(0x7f00000002c0)='/dev/loop#\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000000c0)) 00:04:00 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x9) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) sendfile(r0, r1, 0x0, 0x8000fffffffe) 00:04:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:04:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:00 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0xc00000000000008, 0x4) socket$inet6(0xa, 0x0, 0x0) poll(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_emit_ethernet(0x76, &(0x7f00000002c0)={@random="2174a48ab595", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "4c000f", 0x40, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @empty, @mcast2, [@hopopts={0x3a}], "0200000000000000"}}}}}}}, 0x0) 00:04:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:00 executing program 2: 00:04:00 executing program 4: 00:04:03 executing program 1: 00:04:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:03 executing program 2: 00:04:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:03 executing program 0: 00:04:03 executing program 4: 00:04:03 executing program 0: 00:04:03 executing program 4: 00:04:03 executing program 1: 00:04:03 executing program 2: 00:04:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:03 executing program 0: 00:04:03 executing program 1: 00:04:03 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:03 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x100000000000000, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 00:04:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) [ 1163.768287][ T31] audit: type=1804 audit(1572739443.823:59): pid=27331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/789/file0/bus" dev="ramfs" ino=111570 res=1 00:04:03 executing program 1: pipe(0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) 00:04:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket(0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) [ 1163.865305][ T31] audit: type=1804 audit(1572739443.853:60): pid=27331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/newroot/789/file0/bus" dev="ramfs" ino=111570 res=1 00:04:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:04 executing program 1: 00:04:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:04 executing program 1: [ 1164.537202][ T31] audit: type=1804 audit(1572739444.593:61): pid=27361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/789/file0/file0/bus" dev="ramfs" ino=112645 res=1 [ 1164.574083][ T31] audit: type=1804 audit(1572739444.623:62): pid=27361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/newroot/789/file0/file0/bus" dev="ramfs" ino=112645 res=1 00:04:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:06 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0xa0001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f00000001c0)='(', 0x20000339) 00:04:06 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:06 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x100000000000000, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 00:04:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) r2 = socket$unix(0x1, 0x0, 0x0) listen(r2, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) connect(r3, 0x0, 0x0) gettid() gettid() listen(0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() gettid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000400)={{0x8b4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 1166.663473][ T31] audit: type=1804 audit(1572739446.713:63): pid=27375 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/790/file0/bus" dev="ramfs" ino=112677 res=1 [ 1166.685713][ T31] audit: type=1804 audit(1572739446.713:64): pid=27375 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/newroot/790/file0/bus" dev="ramfs" ino=112677 res=1 00:04:06 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:07 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:07 executing program 1: write(0xffffffffffffffff, &(0x7f0000594000)="d5", 0xfffffffffffffc33) madvise(&(0x7f000059c000/0x3000)=nil, 0x3000, 0x4) 00:04:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:09 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x100000000000000, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 00:04:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 00:04:09 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:09 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) [ 1169.760663][ T31] audit: type=1804 audit(1572739449.813:65): pid=27419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/791/file0/bus" dev="ramfs" ino=112803 res=1 [ 1169.819346][ T31] audit: type=1804 audit(1572739449.843:66): pid=27419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/newroot/791/file0/bus" dev="ramfs" ino=112803 res=1 00:04:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffb000/0x3000)=nil) 00:04:10 executing program 1: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x973cdd68e4329f25) 00:04:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:10 executing program 1: 00:04:10 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x100000000000000, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 00:04:10 executing program 1: 00:04:10 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:10 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) 00:04:10 executing program 1: 00:04:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:11 executing program 1: [ 1171.024870][ T31] audit: type=1804 audit(1572739451.073:67): pid=27484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/792/file0/bus" dev="ramfs" ino=112929 res=1 00:04:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) [ 1171.077750][ T31] audit: type=1804 audit(1572739451.103:68): pid=27484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/newroot/792/file0/bus" dev="ramfs" ino=112929 res=1 00:04:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:13 executing program 1: 00:04:13 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) 00:04:13 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x100000000000000, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 00:04:13 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) [ 1173.303344][ T31] audit: type=1804 audit(1572739453.353:69): pid=27502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/793/file0/bus" dev="ramfs" ino=112138 res=1 00:04:13 executing program 1: 00:04:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) [ 1173.373254][ T31] audit: type=1804 audit(1572739453.383:70): pid=27502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/newroot/793/file0/bus" dev="ramfs" ino=112138 res=1 00:04:13 executing program 1: pipe2(0x0, 0x0) flock(0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0xa) 00:04:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:14 executing program 1: syz_usb_connect(0x0, 0x36, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x0) 00:04:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) [ 1174.376139][T12721] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 1174.616117][T12721] usb 2-1: Using ep0 maxpacket: 8 [ 1174.736199][T12721] usb 2-1: config 5 has an invalid interface number: 219 but max is 0 [ 1174.744534][T12721] usb 2-1: config 5 has no interface number 0 [ 1174.750940][T12721] usb 2-1: config 5 interface 219 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 1174.762160][T12721] usb 2-1: config 5 interface 219 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 1174.773462][T12721] usb 2-1: New USB device found, idVendor=0694, idProduct=0001, bcdDevice=fb.88 [ 1174.782692][T12721] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1175.036226][T12721] legousbtower 2-1:5.219: get version request failed: -71 [ 1175.043848][T12721] legousbtower: probe of 2-1:5.219 failed with error -71 [ 1175.054675][T12721] usb 2-1: USB disconnect, device number 8 [ 1175.796110][T12721] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 1176.035972][T12721] usb 2-1: Using ep0 maxpacket: 8 [ 1176.156123][T12721] usb 2-1: config 5 has an invalid interface number: 219 but max is 0 [ 1176.164583][T12721] usb 2-1: config 5 has no interface number 0 [ 1176.170997][T12721] usb 2-1: config 5 interface 219 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 1176.182257][T12721] usb 2-1: config 5 interface 219 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 1176.193731][T12721] usb 2-1: New USB device found, idVendor=0694, idProduct=0001, bcdDevice=fb.88 [ 1176.203046][T12721] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 00:04:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:16 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) 00:04:16 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) 00:04:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:16 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)) [ 1176.424082][ T31] audit: type=1804 audit(1572739456.473:71): pid=27545 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/794/file0/bus" dev="ramfs" ino=112239 res=1 00:04:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) [ 1176.466590][T12721] legousbtower 2-1:5.219: get version request failed: -71 [ 1176.474204][T12721] legousbtower: probe of 2-1:5.219 failed with error -71 [ 1176.479177][ T31] audit: type=1804 audit(1572739456.513:72): pid=27545 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/newroot/794/file0/bus" dev="ramfs" ino=112239 res=1 [ 1176.516504][T12721] usb 2-1: USB disconnect, device number 9 00:04:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00', 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:16 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 1176.683337][ T31] audit: type=1804 audit(1572739456.733:73): pid=27560 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/795/file0/bus" dev="ramfs" ino=113130 res=1 00:04:16 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00', 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) [ 1176.742729][ T31] audit: type=1804 audit(1572739456.763:74): pid=27560 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/newroot/795/file0/bus" dev="ramfs" ino=113130 res=1 [ 1176.884994][ T31] audit: type=1804 audit(1572739456.933:75): pid=27568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/796/file0/bus" dev="ramfs" ino=112296 res=1 [ 1176.909709][ T31] audit: type=1804 audit(1572739456.963:76): pid=27568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/newroot/796/file0/bus" dev="ramfs" ino=112296 res=1 00:04:17 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') openat$cgroup_ro(r0, &(0x7f0000001fc0)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcf\x00\x00\x00\x00\x1aO\xb4\xf0_\xbd>\xf3\x1b\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba\xa9\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x00\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/\x94 J\xc8x\xb6#a\xa5[\xbe\x0f\xe1\xf1=\xdd\xfb\xcb\xb0\xe5\xfd\x10wxF\x93\x03cK\r\xb6%\xa6\x0e\xfa\xcd\x18\xe0\x1e\xae\xc5\xa2\xe1*)\xb7]\x99\x83\xe8\xc3\xc1\xb9\x1d0\x9c\x98\xadRm', 0x0, 0x0) pipe(0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) dup3(r2, r1, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) dup3(r4, r3, 0x0) r5 = eventfd2(0x0, 0x0) r6 = dup(r5) sendfile(r6, r3, 0x0, 0x2008000fffffffe) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)) 00:04:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00', 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00', 0x6) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:19 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) 00:04:19 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r0, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) sendto(r1, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) 00:04:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00', 0x6) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00', 0x6) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00', 0x7) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:22 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r0, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) sendto(r1, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) 00:04:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00', 0x7) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:22 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00', 0x7) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:25 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:25 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:25 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r0, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) sendto(r1, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) 00:04:25 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:25 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:25 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:25 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) accept$alg(r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) accept$alg(r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:28 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:28 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) accept$alg(r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000bc0)}], 0x1, &(0x7f0000005280)=[{0x10, 0x101, 0x100}, {0x18, 0x0, 0x0, "8bcc598d"}, {0x80, 0x0, 0x0, "de881cdcddbc1ebf3512ee8026f6619484362f179cc97935c6b84b1e4c86e805b882cd1e794268166e157e3caca24ee62f7a0ecb68cebf9e081f99689e4dcc1e2af7e3b930ba835536a6eb7b6ccde90c4fe16aa888aa1e9f467d5fdf372d9aeab47f8b7e67d095a5d76997"}], 0xa8}}], 0x3, 0x0) 00:04:28 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:28 executing program 2: mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) 00:04:29 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:29 executing program 2: mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) 00:04:31 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:31 executing program 2: mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:31 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:31 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:31 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) 00:04:32 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:04:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:32 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:32 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{&(0x7f0000000a40)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:04:32 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:32 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:04:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}], 0x1, 0x0) 00:04:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}], 0x1, 0x0) 00:04:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}], 0x1, 0x0) 00:04:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:35 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:35 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:35 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1a8", 0x7}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:35 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:35 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:35 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 1195.668947][T27866] ptrace attach of "/root/syz-executor.3"[27865] was attempted by "/root/syz-executor.3"[27866] 00:04:35 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:38 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:38 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:38 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:38 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:38 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:38 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}], 0x1, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:38 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:39 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:39 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}], 0x1, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:39 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:39 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:39 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}], 0x1, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {0x0}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:39 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {0x0}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:42 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:42 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:42 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:42 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:42 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {0x0}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:42 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:45 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:45 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:45 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:45 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 00:04:45 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:45 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:48 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(0x0, 0x0) 00:04:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708f", 0x4}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:48 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:48 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1208.249866][ T31] audit: type=1804 audit(1572739488.302:77): pid=28060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/830/file0/bus" dev="ramfs" ino=115261 res=1 00:04:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708f", 0x4}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:48 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(0x0, 0x0) 00:04:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:48 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1208.491502][ T31] audit: type=1804 audit(1572739488.542:78): pid=28081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/831/file0/bus" dev="ramfs" ino=115289 res=1 00:04:48 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000380)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(0x0, 0x0) 00:04:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708f", 0x4}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) [ 1208.694475][ T31] audit: type=1804 audit(1572739488.742:79): pid=28096 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/newroot/832/file0/bus" dev="ramfs" ino=115318 res=1 00:04:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:51 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020", 0x81}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:51 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8", 0x5}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8", 0x5}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:51 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8b9c02807d700ec6ecc6b6ee5f8b87842e8037df7d7f71fbd29ac492b58a99aa8370490", 0x46}, {&(0x7f0000000b40)="a577708fb8", 0x5}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x1, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:51 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x1, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:54 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:54 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:04:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f", 0x29}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x1, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:54 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:54 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:55 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:04:57 executing program 2: 00:04:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:57 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:57 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:04:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:57 executing program 2: 00:04:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f67cbe64675bb81ec05d011b3ac4b3588dd8", 0x23}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:57 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:04:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:04:58 executing program 2: 00:04:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:04:58 executing program 2: 00:05:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:00 executing program 2: 00:05:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:00 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:05:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:00 executing program 2: 00:05:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:05:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9ccec82fb170f31f6", 0x12}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:05:01 executing program 2: 00:05:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:05:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)='<', 0x1}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:01 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:05:01 executing program 2: 00:05:01 executing program 0: pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)='<', 0x1}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)='<', 0x1}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:03 executing program 2: 00:05:03 executing program 0: pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:03 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:05:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf90c54604b00dba8a9", 0xa}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:04 executing program 2: 00:05:04 executing program 0: pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:04 executing program 2: 00:05:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:04 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:04 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:04 executing program 2: 00:05:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) sendto(r0, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:04 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:04 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x4, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$sock(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$sock(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@timestamping={{0x14}}], 0x18}, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) close(0xffffffffffffffff) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:05:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) [ 1224.758325][T28382] ptrace attach of "/root/syz-executor.1"[28378] was attempted by "/root/syz-executor.1"[28382] 00:05:04 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1224.810172][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1224.903190][T28391] ptrace attach of "/root/syz-executor.1"[28390] was attempted by "/root/syz-executor.1"[28391] 00:05:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:07 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x4, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$sock(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$sock(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@timestamping={{0x14}}], 0x18}, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) close(0xffffffffffffffff) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:05:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) sendto(r0, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:07 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)='<', 0x1}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) sendto(r0, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) [ 1227.336689][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:05:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:07 executing program 4: pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) sendto(r0, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)='<', 0x1}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:07 executing program 4: pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) sendto(r0, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:10 executing program 4: pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) sendto(r0, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) 00:05:10 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x4, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$sock(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$sock(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@timestamping={{0x14}}], 0x18}, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) close(0xffffffffffffffff) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:05:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)='<', 0x1}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2, &(0x7f0000003600)=[{0x40, 0x0, 0x6, "7920fb27d7ad0d83ab13e0d1d70aca5b0b6feb501fb5bfd5874b106b85a4480dd177ed079e4760e9d142547b463b"}, {0x60, 0x108, 0x0, "e9e28eb8e2e9c178514269e43313755c9815ab462422bcf16afb830b41d44eb087ef227f086fea2e39ce287fa20bd1879ae9bd1d14bc1d87dcf14225d49e76ac525fbd59f69d8f3e9a574f11"}, {0x48, 0x10e, 0x0, "f37c9dee3828b305b46d3d08d7ed0d8ed698d1d87e00324718d29a85539de4ae4eb6cdda686107e19c4ab038e679630c38efd5965283"}, {0x10}, {0x30, 0x109, 0x3, "d16ede16f985daf10360db29bf9dedba344f95e0b8ff3294c430"}, {0x40, 0x10c, 0x0, "067d6e075ed801e62343b5a99e2606298ef24a650d84e39826bde0c5f80ba4c55388c07439ab7a5931a5fa"}, {0x10, 0x108}, {0xa8, 0x108, 0x0, "92e898ee1cfefc946cbe645ccc0f20faf80f2b7b1be8dcd2ab6ef6534a3423d05775b883bf74d4340ce1f7c579db0939ae366902a72e74b93cdd5e52330a68de8449824f64df3f0de9e340eacadb43afd1ff668d13b405d323dc0054e21b86e4f01b411009e29aea8fbc571e779310c4e83dd95a181efe4c8585d3e70e71a45b8c6f68d6bdbebe8da218e2119faaebbeb23bfad2d2fb"}], 0x220}}], 0x2, 0x0) 00:05:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:10 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1230.393776][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:05:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000008c0)="b30703b8ff954e9c97166bedb7bf5556c0549442d4", 0x15}, {&(0x7f0000000900)="8d55", 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x2, 0x0) 00:05:10 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x1, 0x0) 00:05:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:10 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 00:05:13 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:13 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x4, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$sock(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$sock(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@timestamping={{0x14}}], 0x18}, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) close(0xffffffffffffffff) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:05:13 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 1233.456491][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:05:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 00:05:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}], 0x1}}], 0x1, 0x0) 00:05:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}], 0x1}}], 0x1, 0x0) 00:05:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:14 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:16 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}], 0x1}}], 0x1, 0x0) 00:05:16 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x4, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$sock(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$sock(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@timestamping={{0x14}}], 0x18}, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) close(0xffffffffffffffff) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:05:16 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {0x0}], 0x2}}], 0x1, 0x0) 00:05:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f0", 0x93}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1236.605887][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:05:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {0x0}], 0x2}}], 0x1, 0x0) 00:05:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {0x0}], 0x2}}], 0x1, 0x0) 00:05:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)}], 0x2}}], 0x1, 0x0) 00:05:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)}], 0x2}}], 0x1, 0x0) 00:05:17 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:17 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)}], 0x2}}], 0x1, 0x0) 00:05:17 executing program 2: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='smaps\x00') sendfile(r0, r1, 0x0, 0x88001) 00:05:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)="a57770", 0x3}], 0x2}}], 0x1, 0x0) 00:05:17 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[], 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f0", 0x93}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)="a57770", 0x3}], 0x2}}], 0x1, 0x0) 00:05:19 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f0000001900), 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) fchdir(0xffffffffffffffff) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) open(0x0, 0x141000, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x18, &(0x7f00000001c0), 0x4) r3 = open(&(0x7f0000000240)='./bus\x00', 0x100000141042, 0x0) ftruncate(r3, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendfile(r1, r3, 0x0, 0x8000fffffffe) connect$unix(r2, &(0x7f0000000400)=@abs, 0x6e) 00:05:19 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[], 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:20 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[], 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:20 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f0000001900), 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) fchdir(0xffffffffffffffff) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) open(0x0, 0x141000, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x18, &(0x7f00000001c0), 0x4) r3 = open(&(0x7f0000000240)='./bus\x00', 0x100000141042, 0x0) ftruncate(r3, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendfile(r1, r3, 0x0, 0x8000fffffffe) connect$unix(r2, &(0x7f0000000400)=@abs, 0x6e) 00:05:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)="a57770", 0x3}], 0x2}}], 0x1, 0x0) 00:05:20 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[], 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)="a577708fb8", 0x5}], 0x2}}], 0x1, 0x0) 00:05:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)) read(r2, &(0x7f00000000c0)=""/19, 0x8) 00:05:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f0", 0x93}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)="a577708fb8", 0x5}], 0x2}}], 0x1, 0x0) 00:05:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:22 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x40, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="d3fcd006b3c82c741a764cea80df4f2e5b", 0x11) openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) setsockopt$packet_int(r2, 0x107, 0xc, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r4, 0x0) ioctl$VHOST_SET_VRING_ERR(r4, 0x4008af22, &(0x7f0000000140)={0x2, r2}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x501002, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r5, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) stat(0x0, &(0x7f0000000100)) getegid() r6 = open(0x0, 0x0, 0x0) write$P9_RWALK(r6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$NS_GET_OWNER_UID(r6, 0xb704, 0x0) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() setresgid(0x0, r8, 0x0) fchown(0xffffffffffffffff, r7, r8) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r9, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f00000002c0)={{{@in, @in6=@loopback}}, {{@in=@local}, 0x0, @in6}}, 0x0) r10 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r10, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d40)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001e40)=0xe8) r11 = getegid() setresgid(0x0, r11, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) r12 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r12) r13 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r13, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000002540)) r14 = getpid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$int_in(r15, 0x0, &(0x7f00005ebff8)) fcntl$setsig(r15, 0xa, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000180)={0x2, r14}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003bc0)) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$int_in(r16, 0x5452, 0x0) fcntl$setsig(r16, 0xa, 0x12) fcntl$setownex(r16, 0xf, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f0000004ec0)) r17 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r17, 0xffffffffffffffff) r18 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r18, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r18, 0xffffffffffffffff) mq_open(&(0x7f0000004f40)='vboxnet0^wlan1)\x00', 0x0, 0x100, &(0x7f0000004f80)={0x3ff, 0x8001, 0x1, 0x6, 0x9, 0x0, 0x2, 0x38}) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) accept4$packet(r3, &(0x7f0000004fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000005040)={0x20}, 0x8, 0x80000) r19 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r19, 0x0) write$P9_RWALK(r19, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000005080)='/dev/full\x00', 0x0, 0x0) r20 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r20, 0x0) r21 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r20, r21) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, 0x0) r22 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r22, 0x10, &(0x7f0000005100)) stat(0x0, &(0x7f0000000100)) r23 = getegid() setresgid(0x0, r23, 0x0) 00:05:22 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[], 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:22 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="3cf9", 0x2}, {&(0x7f0000000b40)="a577708fb8", 0x5}], 0x2}}], 0x1, 0x0) 00:05:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 00:05:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x1}}], 0x1, 0x0) 00:05:23 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:23 executing program 2: 00:05:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x1}}], 0x1, 0x0) 00:05:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b580", 0xac}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:25 executing program 2: 00:05:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x1}}], 0x1, 0x0) 00:05:25 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:25 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[], 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x1, 0x0) 00:05:26 executing program 2: 00:05:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b580", 0xac}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x1, 0x0) 00:05:26 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:26 executing program 2: 00:05:26 executing program 2: 00:05:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x1, 0x0) 00:05:26 executing program 2: 00:05:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x1, 0x0) 00:05:26 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:29 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:29 executing program 2: 00:05:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b580", 0xac}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x1, 0x0) 00:05:29 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:29 executing program 2: 00:05:29 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a", 0xb8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:29 executing program 2: 00:05:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x1, 0x0) 00:05:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a", 0xb8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:32 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:32 executing program 2: 00:05:32 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)='<', 0x1}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x1, 0x0) 00:05:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a", 0xb8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)='<', 0x1}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x1, 0x0) 00:05:32 executing program 2: 00:05:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaa", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:32 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:32 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:32 executing program 2: 00:05:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)='<', 0x1}, {&(0x7f0000000b40)="a577708fb8c1", 0x6}], 0x2}}], 0x1, 0x0) 00:05:32 executing program 2: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000738ff0)={0x2, 0x0, @local}, 0x10) r0 = gettid() syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f00000001c0)='nodev\\]@\x00', 0x0) keyctl$setperm(0x5, r2, 0x20000000) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000080)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) getpid() tkill(0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x3, 0x4e20, 0x6, 0xa, 0x0, 0x0, 0x32, 0x0, r3}, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x743234ab, 0x7}, {0xfffffffffffffb09, 0x6, 0x5}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@multicast2, 0x4d2}, 0x2, @in=@loopback, 0x34ff, 0x0, 0x0, 0x81, 0x100, 0x1f, 0xffffffff}}, 0xe8) r4 = creat(0x0, 0x1d3) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) 00:05:32 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:32 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0xda00) 00:05:32 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:32 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f0000000080)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x6, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x4000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @loopback}}}}}}}, 0x0) 00:05:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:35 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:35 executing program 2: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) fanotify_mark(r1, 0x51, 0x10, 0xffffffffffffffff, 0x0) 00:05:35 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0xa7e89ef7d11f8151, 0x0) 00:05:35 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaa", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002880)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x10, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0xfd}]}}}], 0x10}}], 0x1, 0x0) 00:05:35 executing program 5: 00:05:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaa", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:35 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:35 executing program 2: 00:05:35 executing program 5: 00:05:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:38 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a", 0xc1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:38 executing program 2: 00:05:38 executing program 5: 00:05:38 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:38 executing program 2: 00:05:38 executing program 5: mknod$loop(&(0x7f0000000380)='./file1\x00', 0x2000, 0xffffffffffffffff) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) poll(&(0x7f00000002c0)=[{r0, 0x40}], 0x1, 0x0) 00:05:38 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:38 executing program 5: munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xd49f275d97cc01bb, 0x1810, 0xffffffffffffffff, 0x0) 00:05:38 executing program 2: r0 = socket(0x18, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0xffffffffffffff7b) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x8) 00:05:38 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:41 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:41 executing program 5: r0 = socket(0x18, 0x3, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/122, 0x7a, 0x0, &(0x7f0000000040), 0xc) shutdown(r0, 0x0) 00:05:41 executing program 2: r0 = socket(0x18, 0x3, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@in6={0x18}, 0xc, 0x0}, 0x0) 00:05:41 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:41 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a", 0xc1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:41 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() r1 = gettid() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000001c0)=""/11, 0xb) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000180)) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r3, &(0x7f0000000040)={r3}) ptrace(0x4206, r0) tkill(r0, 0x800000009) 00:05:41 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:41 executing program 2: 00:05:41 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:41 executing program 5: 00:05:41 executing program 2: 00:05:42 executing program 2: 00:05:42 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:42 executing program 5: 00:05:42 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:44 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:44 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a", 0xc1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:44 executing program 5: 00:05:44 executing program 2: 00:05:44 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:44 executing program 5: 00:05:44 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:44 executing program 2: 00:05:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b5095", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:44 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:45 executing program 5: 00:05:45 executing program 2: 00:05:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b5095", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e80", 0xc3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:47 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:47 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:47 executing program 2: 00:05:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x400454d1, &(0x7f00000002c0)={0x0, 0x0}) 00:05:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b5095", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x400454f7, &(0x7f00000002c0)={0x0, 0x0}) 00:05:47 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec97332", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:47 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:47 executing program 5: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) mlock(&(0x7f00002ce000/0x2000)=nil, 0x2000) 00:05:48 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e80", 0xc3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:50 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 00:05:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 00:05:50 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:50 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000680)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) readv(r0, &(0x7f0000000ac0)=[{&(0x7f0000000080)=""/181, 0xb5}], 0x1) 00:05:50 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec97332", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:51 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:51 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:51 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:51 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e80", 0xc3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:53 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:53 executing program 5: 00:05:53 executing program 2: 00:05:53 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:53 executing program 2: 00:05:53 executing program 5: 00:05:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec97332", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:54 executing program 2: 00:05:54 executing program 5: 00:05:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000001000)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000000000007007f6699000000000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba71996d8ee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b717e127c6a36da871a86cc8c8dda850000000002000100000000000000020080ffffff05000500000000000a000000def7bd3e10c05ce0099e088c374525b1f361d6c7358f00000000fe04654184a8"], 0xdc}}, 0x0) socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0xbff, &(0x7f0000000400)="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"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x0}, 0x68) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 00:05:54 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$vsock_stream(0x28, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 00:05:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b520", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:05:56 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r3, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0x3, 0x0, 0x8, 0x99, 0x0, 0x0, 0x8, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x734, 0x5, @perf_bp={0x0, 0x4}, 0x4000, 0x2, 0x10, 0x8, 0x4, 0x2, 0x8}, r1, 0x2, r2, 0x8) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r5 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x2) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) fstat(r0, 0x0) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000480)="56ac42d6fe9e38928281b560670d755543dfda2e17cf49b3479d2af5c8658eee49e24805b3bab0133427c33f47e78fa718d7cb8b9709d553639a2875a882d3adce73b0aeb6a806132bb820e93440ced3e57ffee393f4141437537acbfaced54354df16da2ec59ccb94e1297fd0d6e92d87f8c69a4817ddd303eb8974276470823b6da5ebcbe5b3df792a2e7e705ed75be269c42c27") ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000080)={0x7fff, 0x10001}) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r4, r4, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r4, 0x4c01) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:05:56 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:56 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:56 executing program 2: syz_usb_connect(0x0, 0x3b, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) write$char_usb(r0, 0x0, 0x0) [ 1274.390269][T29270] ptrace attach of "/root/syz-executor.5"[16616] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ °ÿ ÿÿÿÿ   ðï  ÿ\x0b  @ = 00:05:57 executing program 5: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000000000040ac050e02f646aef80001090224000101000000090400000903010200092100000001220000090581030700000000"], 0x0) syz_open_dev$evdev(&(0x7f0000001b80)='/dev/input/event#\x00', 0xea, 0x6080) [ 1277.296143][T19717] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 1277.396185][T25119] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 1277.536107][T19717] usb 3-1: Using ep0 maxpacket: 16 [ 1277.656434][T19717] usb 3-1: config 0 has an invalid interface number: 101 but max is 0 [ 1277.664938][T19717] usb 3-1: config 0 has an invalid descriptor of length 255, skipping remainder of the config [ 1277.676338][T19717] usb 3-1: config 0 has no interface number 0 [ 1277.682529][T19717] usb 3-1: config 0 interface 101 altsetting 0 endpoint 0x8C has an invalid bInterval 255, changing to 11 [ 1277.694022][T19717] usb 3-1: config 0 interface 101 altsetting 0 endpoint 0x8C has invalid maxpacket 1792, setting to 1024 00:05:57 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, 0x0, 0x0) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) [ 1277.705532][T19717] usb 3-1: config 0 interface 101 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 17 [ 1277.719436][T19717] usb 3-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=a5.c1 [ 1277.728783][T19717] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1277.747502][T19717] usb 3-1: config 0 descriptor?? 00:05:57 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) [ 1277.814188][T19717] yurex 3-1:0.101: USB YUREX device now attached to Yurex #0 [ 1277.827739][T25119] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1277.839084][T25119] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 1277.966994][T25119] usb 6-1: New USB device found, idVendor=05ac, idProduct=020e, bcdDevice=46.f6 [ 1277.976293][T25119] usb 6-1: New USB device strings: Mfr=174, Product=248, SerialNumber=0 [ 1277.984735][T25119] usb 6-1: Product: syz [ 1277.989187][T25119] usb 6-1: Manufacturer: syz [ 1278.003131][T12721] usb 3-1: USB disconnect, device number 4 [ 1278.015688][T12721] yurex 3-1:0.101: USB YUREX #0 now disconnected [ 1278.041591][T25119] input: appletouch as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:1.0/input/input9 [ 1278.269816][T12721] usb 6-1: USB disconnect, device number 2 [ 1278.283976][T12721] appletouch 6-1:1.0: input: appletouch disconnected 00:05:58 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, 0x0, 0x0) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:05:58 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) [ 1278.776753][T25119] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 1279.026148][T25119] usb 3-1: Using ep0 maxpacket: 16 [ 1279.036542][T12721] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 1279.146497][T25119] usb 3-1: config 0 has an invalid interface number: 101 but max is 0 [ 1279.155038][T25119] usb 3-1: config 0 has an invalid descriptor of length 255, skipping remainder of the config [ 1279.165995][T25119] usb 3-1: config 0 has no interface number 0 [ 1279.172201][T25119] usb 3-1: config 0 interface 101 altsetting 0 endpoint 0x8C has an invalid bInterval 255, changing to 11 [ 1279.183853][T25119] usb 3-1: config 0 interface 101 altsetting 0 endpoint 0x8C has invalid maxpacket 1792, setting to 1024 [ 1279.198233][T25119] usb 3-1: config 0 interface 101 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 17 [ 1279.212397][T25119] usb 3-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=a5.c1 [ 1279.221721][T25119] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1279.232728][T25119] usb 3-1: config 0 descriptor?? [ 1279.292712][T25119] yurex 3-1:0.101: USB YUREX device now attached to Yurex #0 [ 1279.426536][T12721] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1279.437784][T12721] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 1279.481114][T25119] usb 3-1: USB disconnect, device number 5 [ 1279.490606][T25119] yurex 3-1:0.101: USB YUREX #0 now disconnected 00:05:59 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, 0x0, 0x0) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) [ 1279.598463][T12721] usb 6-1: New USB device found, idVendor=05ac, idProduct=020e, bcdDevice=46.f6 [ 1279.607881][T12721] usb 6-1: New USB device strings: Mfr=174, Product=248, SerialNumber=0 [ 1279.616568][T12721] usb 6-1: Product: syz [ 1279.620858][T12721] usb 6-1: Manufacturer: syz [ 1279.682130][T12721] input: appletouch as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:1.0/input/input10 [ 1279.878410][T12721] usb 6-1: USB disconnect, device number 3 [ 1279.901645][T12721] appletouch 6-1:1.0: input: appletouch disconnected 00:06:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:00 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:00 executing program 2: syz_open_dev$hidraw(&(0x7f0000000140)='/dev/../raw#\x00', 0xfffffffffffffff8, 0x8a42) r0 = syz_open_dev$hidraw(0x0, 0x0, 0xe9202) write$hidraw(r0, &(0x7f0000001200)='\x00', 0xffffff45) syz_open_dev$hidraw(0x0, 0x8, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000140)='/dev/../raw#\x00', 0x0, 0x2) ioctl$HIDIOCAPPLICATION(r1, 0xc028660f, 0x400003) syz_open_dev$hidraw(&(0x7f0000000140)='/dev/../raw#\x00', 0x0, 0x2) 00:06:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b520", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:00 executing program 5: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) close(0xffffffffffffffff) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f0000000000)={0x580000, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x3800000]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r2, 0x402c5828, &(0x7f0000000000)={0x580000, 0x0, 0x1001000200000000, 0x0, 0x0, 0x0, [0x0, 0x3800000]}) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x50) 00:06:00 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ddf000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x9, 0x0) 00:06:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:00 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:00 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000000)='L', 0x1) 00:06:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_script(r0, 0x0, 0x0) close(r0) close(r1) 00:06:01 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640), 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f00000003c0)=""/145, 0x91}], 0x1, 0xd00) 00:06:01 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000068e000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0) 00:06:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000080)=""/28, 0x1c}], 0x1, 0x8bc) 00:06:03 executing program 5: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00') readlink(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/5, 0x5) 00:06:03 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640), 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:03 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000300)="390000001100090468fe585de9e600000700ff3f03000000450001070000001419001a0004001210070000f48aa159ab09", 0x31}], 0x1) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 00:06:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b520", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:03 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2f) 00:06:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$evdev(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 00:06:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x100000}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:06:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:03 executing program 5: 00:06:03 executing program 2: 00:06:03 executing program 5: 00:06:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:06 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640), 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:06 executing program 2: 00:06:06 executing program 5: 00:06:06 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:06 executing program 2: 00:06:06 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc040564b, &(0x7f0000000080)) 00:06:06 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) unshare(0x8000400) splice(r0, 0x0, r2, 0x0, 0x19403, 0x0) 00:06:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x22000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000006e80)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000002a00)="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", 0x571}, {&(0x7f0000000300)="b7", 0x1}, {&(0x7f0000003a00)="df8951191d81d592f5d75bf6fe2e33d3fe3b271e5824b0d31773c070c75a9cfb8752fa4feec02250be95a152156c45b1cf2173e18c3556ac9e75b0420e4b4c9a8457422106c6c1bd47cb7f12f0e8baabddbabf2cacd71163a45e8a8f0d891c7398d9dadcd1ade959bf6249ca9ccced42162f568775872ce9e37dfd7dc8e4520281c7bea2e7ef87b6968bb36defb98983cfd4e58eedcdce3c433391f43cd9cde8edadd1494ba5dc39677a705673c7e9", 0xaf}], 0x3}}], 0x1, 0x6049054) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r1, r0, 0x0) 00:06:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000000)="58000000140019234083feff040d8c560a06580200ffa400000000000000ffff00000000000064009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000008000000000000", 0x58}], 0x1) 00:06:07 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{0x0}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x22000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000003ac0)=[{{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000001680)="86", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000003940)=[{&(0x7f0000000140)='r', 0x1}], 0x1}}], 0x2, 0x1) 00:06:09 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{0x0}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:09 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:09 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) 00:06:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000000), 0x10) 00:06:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 00:06:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet(0x10, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x447) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) shutdown(r0, 0x1) 00:06:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x25a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8200) socket(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) creat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 00:06:10 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf104340551378d4a}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000308) 00:06:10 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{0x0}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:10 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x25a, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa82dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) ftruncate(r0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) creat(0x0, 0x0) setfsgid(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) open(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000a40)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000000)={0x580000, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x3800000]}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 00:06:10 executing program 2: 00:06:10 executing program 2: 00:06:10 executing program 2: 00:06:10 executing program 2: 00:06:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65e", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:13 executing program 2: 00:06:13 executing program 5: 00:06:13 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:13 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65e", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:13 executing program 2: 00:06:13 executing program 5: 00:06:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65e", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:13 executing program 2: 00:06:13 executing program 5: 00:06:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee7", 0x87}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:16 executing program 2: 00:06:16 executing program 5: 00:06:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee7", 0x87}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:16 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:16 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640), 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee7", 0x87}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:16 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) memfd_create(0x0, 0x0) pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0x43}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000100), 0x1042b) sendto(r0, &(0x7f0000000300)="d8", 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f00000002c0)='$', 0x1, 0x0, 0x0, 0x296) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) close(r0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 00:06:16 executing program 2: r0 = socket(0x1f, 0x1, 0x0) shutdown(r0, 0x2) 00:06:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:16 executing program 2: mknod(&(0x7f0000000140)='./bus\x00', 0x3a0914c44f7b802c, 0x1b00) r0 = open(&(0x7f0000000000)='./bus\x00', 0x400000003fd, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="d277acb4698a76e5ed1e6bf50cdf11db53932c2e3acdba3d6e52dd2838f7c4cbec2b704794b3f5d2917f1380b49f05873b8d2c680a8702ac323b33eb6cd2f2a5dc0becf7ba044433b32626203a244d8b971b3619adc19e3e59711e09565d8749b1d952f221cad18c5ebd0df70e2087ca23c605d2facf79d1e46975109a94e75992d4861629a1983c980034b5d42ab447e131c9d6ebe2f02b41892f8c88e0ec8574a736c3fafb14ff786c2b96c00402cac07ec81de54cb4f3a8765ea76bb15865", 0xc0}], 0x1}, 0x0) write(r0, &(0x7f0000000040)='mL', 0xfffffc59) execve(0x0, 0x0, 0x0) 00:06:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:16 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/cgroup\x00') ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) 00:06:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:17 executing program 5: 00:06:17 executing program 2: 00:06:17 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:17 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640), 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000180)=@req3={0x89, 0x100000001}, 0x1c) 00:06:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:17 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 00:06:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000040), 0x4) sendto$inet(r0, &(0x7f0000000dc0)="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", 0x991, 0x0, 0x0, 0x0) close(r0) 00:06:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:17 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup\x00\x8a@\xd2e\xb4W\xab\x99\xac\xb4\x9a\a\xea\x1c\xc5\xf9\xfd(2+mTS\xbc\xd0F\x88\x10\xd2\x11\xdc\x81q_\xc0Q\x1bE\x970Wv\xbeKN\tV\xb0\x01\x15\x18\x9c\x8b\xea\xe9 \x19\x0e\xfc8M\xb1 \x05\x82\xccW \x06\xe2\x06\xd5\xb3\aTbK\xd9\xa1DY\xbeZ5\x85\x04!\x90_\xfb\xa5\xfaX\xe8R\xe1\r\x1b\xa1\xb6\xd2)\x8bM\xe2\xb6\xac^\xe5\x84\xa9\x8fE{o\xb8\b\xb6\xd7P\xa3\x1a\x01\x8b{\x10J o\xeb\xb2|\x1d\xdb\xf2n@\x83\xeae\xbf\x9b\xcb\xbdj\x02\x8e\xa09\xbfo;\xce\x85\xea%\xe8\x84\xd8\xc6\xdfI\xe6\xa8\xf1\x00\x19kN\xce', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000300), 0x3e1) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$eventfd(r1, &(0x7f00000001c0), 0xffffff7f) r2 = open(&(0x7f0000000040)='./bus\x00', 0x10d000, 0x0) read$FUSE(r2, &(0x7f0000002200), 0x1000) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) fallocate(r4, 0x0, 0x0, 0x16d2) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4}) creat(0x0, 0x0) 00:06:17 executing program 5: r0 = socket(0x18, 0x3, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, &(0x7f0000000280)={0x248}, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/32, &(0x7f0000000180)=0x20) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="4e0652ba57528283b33cb58ec9bea650e147f866110a66b8d126a97c67101c017f3917d34f3b81b149031429f193b1644f22e3578bb45f88", 0x2af}], 0x1) 00:06:17 executing program 2: r0 = socket(0x18, 0x3, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, &(0x7f0000000280)={0x248}, 0x0) r1 = socket(0x18, 0x2, 0x0) connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) getsockname$unix(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000dd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/110], &(0x7f0000000040)=0x6e) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="4e0652ba57528283b33cb58ec9bea650e147f866110a66b8d126a97c67101c017f3917d34f3b81b149031429f193b1644f22e3578bb45f88", 0x2af}], 0x1) 00:06:17 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:20 executing program 5: 00:06:20 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640), 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:20 executing program 2: 00:06:20 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:20 executing program 5: 00:06:20 executing program 2: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x5c, 0x2e, 0xa6, 0x8, 0x1c73, 0x861f, 0xa688, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x10, 0xca, 0x58}}]}}]}}, 0x0) 00:06:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:20 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:20 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2, 0x81000000}, @empty, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @dev, @ipv4={[], [], @broadcast}, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}, 0x0) 00:06:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:20 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:20 executing program 5: clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='\x00', &(0x7f0000000100)='ocfs2\x00', 0x141030, &(0x7f0000000140)='user\x00') syslog(0x2, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1, 0x74}, &(0x7f0000000800)='])+\xe4\x00\x19I0z\xf9\xdc~\xb0\xba\r\x9f\xf1q\xe5\x19\xa3\xf4R\xf6yae+\xa1\xbc\x1dqP\xcd|\xbf(\xe0L\x87\xbf\xc26\xaa\xf2Hb\xa7\xae\xd7\xb9\xfb\xf1+\xea\xd6\xfa\xf9\xc4}\xb6\x14{\x91\x86B\xbc\x91\x9d:\xedx\x1fIK B\xd8@\xe7\xa9\xc8\xdd)\x91.\x83\xbfo\xa0\a\xb5&\xfd\xb5W\x8f\xfeN\xeaH\xf8\xc3%<\x7f\xdc\xa9\xa6Uua\xaf\xc6L\xbd\xbfz@z\x84`\x8e\xa4\x1b\x82\xb0\x99Oe\xde\v\xd3\xadg\x96\xf0g\v\x8f_\x94\xda\xbd\xf9\x80\xb4\xd0C\xdd<\x96\xea\x98\x7f\xb3', 0x0) [ 1300.537460][T25119] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 1300.786076][T25119] usb 3-1: Using ep0 maxpacket: 8 00:06:20 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{0x0}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:20 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:20 executing program 5: [ 1300.906961][T25119] usb 3-1: New USB device found, idVendor=1c73, idProduct=861f, bcdDevice=a6.88 [ 1300.916613][T25119] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1300.928147][T25119] usb 3-1: config 0 descriptor?? [ 1300.970673][T25119] usb 3-1: dvb_usb_v2: found a 'Anysee' in warm state [ 1300.978127][T25119] usb 3-1: dvb_usb_v2: usb_bulk_msg() failed=-22 [ 1300.984706][T25119] dvb_usb_anysee: probe of 3-1:0.0 failed with error -22 00:06:21 executing program 5: [ 1301.169214][T25119] usb 3-1: USB disconnect, device number 6 [ 1301.936286][T12721] usb 3-1: new high-speed USB device number 7 using dummy_hcd [ 1302.177729][T12721] usb 3-1: Using ep0 maxpacket: 8 [ 1302.296322][T12721] usb 3-1: New USB device found, idVendor=1c73, idProduct=861f, bcdDevice=a6.88 [ 1302.305583][T12721] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1302.317021][T12721] usb 3-1: config 0 descriptor?? [ 1302.360945][T12721] usb 3-1: dvb_usb_v2: found a 'Anysee' in warm state [ 1302.368147][T12721] usb 3-1: dvb_usb_v2: usb_bulk_msg() failed=-22 [ 1302.374711][T12721] dvb_usb_anysee: probe of 3-1:0.0 failed with error -22 [ 1302.558748][T12721] usb 3-1: USB disconnect, device number 7 00:06:23 executing program 2: 00:06:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:23 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:23 executing program 5: 00:06:23 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{0x0}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:23 executing program 2: 00:06:23 executing program 5: 00:06:23 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r0, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) 00:06:23 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="7c0000002400070500"/20, @ANYRES32=r4, @ANYBLOB="0000000005000000000000000a000100636f64656c"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:06:23 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xffffffffffbffff8) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x16) r3 = gettid() kcmp(r0, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 00:06:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1303.758560][T29833] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1303.891536][ T31] audit: type=1326 audit(1572739583.941:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29831 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:06:24 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{0x0}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) [ 1304.553259][ T31] audit: type=1326 audit(1572739584.601:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29831 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:06:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:26 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r0, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) 00:06:26 executing program 5: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f00000001c0)={@empty, @empty}, 0x8) 00:06:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}) 00:06:26 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:26 executing program 2: r0 = socket(0x2, 0x80002, 0x0) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f00000000c0)=0x20001002, 0x4) 00:06:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xf51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) getsockname$netlink(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000580)=0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) gettid() connect$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = geteuid() prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='user\x00') setreuid(r0, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'sy\xe0'}, &(0x7f00000000c0)='sT\x01', 0xfffffffffffffffc) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140)) connect$unix(r4, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) 00:06:26 executing program 2: 00:06:26 executing program 5: 00:06:26 executing program 2: 00:06:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:26 executing program 2: 00:06:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:29 executing program 5: 00:06:29 executing program 2: 00:06:29 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r0, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) 00:06:29 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:29 executing program 5: 00:06:29 executing program 2: 00:06:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:29 executing program 5: 00:06:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:29 executing program 5: 00:06:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:32 executing program 2: 00:06:32 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:32 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:32 executing program 5: 00:06:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:32 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x10, 0x803, 0x0) dup3(r3, r0, 0x0) 00:06:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) 00:06:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:32 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) dup3(r0, r1, 0x0) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000003031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) 00:06:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) read(r0, &(0x7f0000000600)=""/13, 0xccacf294) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f00000003c0)="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", 0xe1d749edada821b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 00:06:35 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:35 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:35 executing program 5: syz_emit_ethernet(0xcb, &(0x7f0000000080)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x4000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @loopback}}}}}}}, 0x0) [ 1315.726988][T29988] IPv6: addrconf: prefix option has invalid lifetime [ 1315.788150][T29988] IPv6: addrconf: prefix option has invalid lifetime 00:06:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:35 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xecac11bf) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)) 00:06:36 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:36 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:36 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:36 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:38 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:38 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) syz_open_procfs(0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4001) 00:06:38 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r0, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) sendto(r1, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) 00:06:38 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000180)={0x108}, 0xffffff02) fcntl$setstatus(r0, 0x4, 0x44800) io_setup(0x5, &(0x7f0000000540)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x5}]) io_setup(0x8, &(0x7f0000000340)=0x0) io_submit(r2, 0x1, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffec3}]) 00:06:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1318.765450][T30030] devpts: called with bogus options [ 1318.823618][T30030] devpts: called with bogus options 00:06:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:39 executing program 5: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) ioctl(r0, 0x6681, 0x0) 00:06:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 00:06:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:39 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:39 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r0, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) sendto(r1, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) 00:06:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 00:06:40 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800000, 0x6}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:06:40 executing program 2: 00:06:40 executing program 2: 00:06:40 executing program 2: 00:06:40 executing program 2: 00:06:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:49 executing program 5: 00:06:49 executing program 2: 00:06:49 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:49 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r0, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) sendto(r1, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) 00:06:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:49 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 00:06:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$invalidate(0x15, 0x0) [ 1329.956416][T30126] loop_reread_partitions: partition scan of loop4 (i« ‹gƒ—!NìŸðÐ̇së²ÏØ›R1z„]=÷YÒ€­Sø‡ÓØù¿B¸‰úÛ™¥Þüy½k #“œI") failed (rc=-13) 00:06:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_genetlink_get_family_id$tipc(0x0) [ 1330.019590][T30134] __loop_clr_fd: partition scan of loop4 failed (rc=-13) [ 1330.122935][T30134] loop_reread_partitions: partition scan of loop4 (i« ‹gƒ—!NìŸðÐ̇së²ÏØ›R1z„]=÷YÒ€­Sø‡ÓØù¿B¸‰úÛ™¥Þüy½k #“œI") failed (rc=-13) [ 1330.191584][T30134] __loop_clr_fd: partition scan of loop4 failed (rc=-13) 00:06:50 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x8000, 0x3}) 00:06:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000240)=0x1302, 0x4000000000dc) 00:06:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000000180)=@framed={{}, [@generic={0x6c}]}, &(0x7f0000000100)='G\xc3$\x05ju\xc3PL\x00\x94\xf7\x1a#\x85x\xa2Br{HS\x00\xd8\x1fl\xfd\vk\xbf\x83\x16m\xca\x0e\xa6\xe2#\x9a\xe5\xc0\x9d\xde\xf2\x01\x00\x00\x00\x00\x00\x00\x00c(\xf2}\x1d', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:06:50 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:06:50 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:50 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) [ 1330.657216][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1330.663521][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1330.670270][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1330.676699][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1330.683324][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1330.689794][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1330.696468][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1330.702782][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1330.709589][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1330.716030][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:06:50 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) 00:06:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:52 executing program 5: pipe(&(0x7f0000000000)) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f00000001c0)={@empty, @empty}, 0x8) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000180)={0xf938, {{0x2, 0x4e20, @multicast2}}}, 0x84) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="31dd9638e37f", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "1400", 0x44, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000]}, @local, {[], @gre={{0x0, 0x501, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21}}}}}}}, 0x0) 00:06:52 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x297, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000003340)=[{{0x0, 0x4000000000000, 0x0}}], 0x600, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') syncfs(0xffffffffffffffff) flock(r0, 0x9) socket$packet(0x11, 0x0, 0x300) 00:06:52 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:06:52 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:53 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x2, 0x0, &(0x7f0000000100)) 00:06:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:06:53 executing program 5: 00:06:53 executing program 2: 00:06:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:55 executing program 5: 00:06:55 executing program 2: 00:06:55 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:06:55 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:56 executing program 5: 00:06:56 executing program 2: 00:06:56 executing program 5: 00:06:56 executing program 2: 00:06:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:56 executing program 5: 00:06:56 executing program 5: 00:06:59 executing program 5: 00:06:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:59 executing program 2: 00:06:59 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:06:59 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:06:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa82dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 00:06:59 executing program 5: fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa82dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 00:06:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:06:59 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, 0x0, 0x0) 00:06:59 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:00 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$P9_RLCREATE(r0, 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) r1 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, 0x0, 0x0) 00:07:02 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:07:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:07:02 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:02 executing program 5: r0 = socket(0x2, 0x80002, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) recvfrom(r0, 0x0, 0x0, 0x12062, 0x0, 0x0) [ 1342.485416][T30334] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:07:02 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492338, 0x0) 00:07:02 executing program 5: r0 = socket(0x10, 0x800000000080002, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x2db, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001900fdff130000e2ff0000970a0000000800030006000000000000000000f400202000000000000000a220dd97f0898a8f453477cd59d23578"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg$alg(r0, &(0x7f0000000140), 0x297, 0x0) 00:07:03 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:03 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, 0x0, 0x0) 00:07:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) 00:07:03 executing program 5: 00:07:03 executing program 5: 00:07:03 executing program 5: 00:07:05 executing program 5: 00:07:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:07:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:07:05 executing program 0: 00:07:05 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:05 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:05 executing program 5: 00:07:05 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000080), 0x71) 00:07:05 executing program 5: syz_usb_connect(0x0, 0x26c, &(0x7f0000001c00)={{0x12, 0x1, 0x0, 0xb9, 0x80, 0x46, 0x8, 0x18b4, 0x1689, 0x242, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x1, 0x0, 0x0, 0xd8, 0x3a, 0x80}}]}}]}}, 0x0) 00:07:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:07:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:07:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:07:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_retopts={{0x10, 0x0, 0x7, {[@generic={0x94, 0x4, "ebf4"}]}}}], 0x10}, 0x0) 00:07:06 executing program 0: ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @local}}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x20000000000000f4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 00:07:06 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000080)) close(r0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) close(r1) [ 1346.028541][T25119] usb 6-1: new high-speed USB device number 4 using dummy_hcd 00:07:06 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000080)) close(r0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) close(r1) [ 1346.288121][T25119] usb 6-1: Using ep0 maxpacket: 8 00:07:06 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:06 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:06 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000080)) close(r0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) close(r1) [ 1346.434952][T25119] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 1346.443426][T25119] usb 6-1: config 0 has no interface number 0 [ 1346.449852][T25119] usb 6-1: New USB device found, idVendor=18b4, idProduct=1689, bcdDevice= 2.42 [ 1346.459082][T25119] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 00:07:06 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @loopback}, 0xc) [ 1346.538329][T25119] usb 6-1: config 0 descriptor?? [ 1346.796907][T25119] dvb_usb_ec168: probe of 6-1:0.1 failed with error -71 [ 1346.807815][T25119] usb 6-1: USB disconnect, device number 4 [ 1347.556026][T25119] usb 6-1: new high-speed USB device number 5 using dummy_hcd [ 1347.806013][T25119] usb 6-1: Using ep0 maxpacket: 8 [ 1347.926285][T25119] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 1347.934562][T25119] usb 6-1: config 0 has no interface number 0 [ 1347.940921][T25119] usb 6-1: New USB device found, idVendor=18b4, idProduct=1689, bcdDevice= 2.42 [ 1347.950098][T25119] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1347.964533][T25119] usb 6-1: config 0 descriptor?? [ 1348.216523][T25119] dvb_usb_ec168: probe of 6-1:0.1 failed with error -71 [ 1348.228509][T25119] usb 6-1: USB disconnect, device number 5 00:07:08 executing program 5: 00:07:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:07:08 executing program 0: 00:07:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:07:08 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:08 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:08 executing program 0: 00:07:08 executing program 5: 00:07:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:07:09 executing program 0: 00:07:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000000080), 0x4) 00:07:09 executing program 5: 00:07:09 executing program 0: 00:07:09 executing program 0: 00:07:09 executing program 5: 00:07:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:07:12 executing program 5: 00:07:12 executing program 0: 00:07:12 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:12 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) 00:07:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:07:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0800b5055e0bcfe87b2071") r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002200)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0}}, {{&(0x7f0000000a80)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xdc05}, 0x1c, 0x0}}], 0x2, 0x0) 00:07:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x1}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f00000001c0)=0x32, 0x118) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:07:12 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000340), &(0x7f0000000400)='\a'}, 0x20) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 00:07:12 executing program 0: 00:07:12 executing program 0: 00:07:12 executing program 0: 00:07:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:07:15 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) 00:07:15 executing program 5: 00:07:15 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:07:15 executing program 0: 00:07:15 executing program 5: 00:07:15 executing program 0: 00:07:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:07:15 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0800b5055e0bcfe87b2071") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="3100000013000900690006342fc56aef40be44081000000046000107000000540d0003c0256465a3000000002065702e1a", 0x31}], 0x10000000000000bc) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x332, 0x0) 00:07:15 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@empty]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback}, 0x10) [ 1355.697391][T30531] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.0'. 00:07:15 executing program 5: 00:07:18 executing program 5: 00:07:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:07:18 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) 00:07:18 executing program 0: 00:07:18 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:18 executing program 0: 00:07:18 executing program 5: 00:07:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91fa28b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a62180900000000000000328e5a2c078a3fe3b52020203517e65ee74e585c9ae2b3ca19477a17f07b1faf9bad806f297c7b736b8f2543768d563bee02e461b5806fe762886a2c4d883750b29a6e2529f2faaaff958a7e8081", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:07:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:07:18 executing program 0: 00:07:18 executing program 5: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@ipx={0x4, 0x0, 0x0, "aabd5b93e06a"}, 0x80) 00:07:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0xd, &(0x7f0000000500)="10", 0x1) 00:07:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:07:18 executing program 5: unshare(0x2040400) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) vmsplice(r0, &(0x7f0000000500)=[{0x0}], 0x1, 0x0) 00:07:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:07:19 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:19 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000a40)=ANY=[]], 0x1, 0x0) msgrcv(r0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/85) 00:07:19 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:21 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000a40)=ANY=[]], 0x1, 0x0) msgrcv(r0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:21 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) fsync(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24000001, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r1, r5, 0x0, 0xfffffffd) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 00:07:21 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 00:07:21 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fremovexattr(r0, &(0x7f0000000000)=@random={'security.', 'user.'}) 00:07:21 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000a40)=ANY=[]], 0x1, 0x0) msgrcv(r0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:21 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4, 0x10, &(0x7f0000000000), 0xff4c}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 00:07:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:07:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 00:07:22 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000000)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x15, 0x0, 0x0) getpid() lseek(r1, 0x800000, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB=' '], 0x1) lseek(r1, 0x0, 0x3) 00:07:22 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000a40)=ANY=[]], 0x1, 0x0) msgrcv(r0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:22 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4, 0x10, &(0x7f0000000000), 0xff4c}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 00:07:22 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000a40)=ANY=[]], 0x1, 0x0) msgrcv(r0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) 00:07:22 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001880)='/dev/autofs\x00', 0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000003880)={0x2, 0x1, 0x101}) 00:07:22 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:07:22 executing program 0: 00:07:22 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:22 executing program 3: 00:07:22 executing program 0: 00:07:25 executing program 3: 00:07:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50951395e21ac09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 00:07:25 executing program 0: 00:07:25 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000a40)=ANY=[]], 0x1, 0x0) msgrcv(r0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) 00:07:25 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:07:25 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:25 executing program 0: 00:07:25 executing program 3: unshare(0x2040400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$void(r3, 0x5450) 00:07:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x5) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 00:07:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:07:25 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='rootfs\x00', 0x0, 0x0) 00:07:25 executing program 0: unshare(0x2040400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$void(r5, 0x5451) 00:07:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) getsockopt$inet_tcp_buf(r3, 0x6, 0x8, &(0x7f0000000980)=""/19, &(0x7f00000009c0)=0x13) 00:07:28 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) 00:07:28 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/90) 00:07:28 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:28 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000a40)=ANY=[]], 0x1, 0x0) msgrcv(r0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) 00:07:28 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000240)=""/189, &(0x7f0000000140)=0xbd) 00:07:28 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg$unix(r0, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000400)="1a2415203ebef32b8b068664cd4dd30815179bbdc9b6122dd75dff340afb67781a97a10a78e1d9390903d4d1ebecebd158c667998b28176b540e257ddcc2468cdbc5c5bc9ffe40e7c191b13a46fdba611376e008c25b7ebf1451b3a24c641f116a31c4f063772cd3d1285c98db88946a31e8929ae4bf2c221d211ee208d7b5ba6fd737a661ecbd809b760f2186c5de27f374", 0x92}, {&(0x7f0000000280)="fb72ea49cb526271ae3d432ef7e8e25975df4be022149a27193ff7e4a49e31b8b454514b24", 0x25}, {&(0x7f00000005c0)="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", 0xbda}], 0x3, &(0x7f0000002bc0)=[@rights={{0x10}}, @rights={{0x10}}], 0x20}], 0x4924924924924cf, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000040)='asymmetric\x00', &(0x7f00000001c0)=@keyring={'key_or_keyring:'}) [ 1368.380991][T30726] IPVS: length: 189 != 8 [ 1368.414171][T30728] IPVS: length: 189 != 8 00:07:28 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "00000044944eeb991a4976e252922cb18f6e2e2aba000000002e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b767950080000000000000010101020000009e15775027ec66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) 00:07:28 executing program 3: r0 = epoll_create(0x5) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) 00:07:28 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000400)) keyctl$session_to_parent(0x12) 00:07:28 executing program 0: 00:07:28 executing program 3: 00:07:28 executing program 1: 00:07:29 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) 00:07:29 executing program 0: 00:07:29 executing program 1: 00:07:29 executing program 3: 00:07:29 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:29 executing program 5: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:29 executing program 1: 00:07:29 executing program 0: 00:07:29 executing program 3: 00:07:29 executing program 1: 00:07:29 executing program 5: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:29 executing program 0: 00:07:30 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) 00:07:30 executing program 1: 00:07:30 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x35b2, 0xe0b7}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) syncfs(r0) fallocate(r1, 0x4000000000000010, 0x7a9a, 0x7fff) 00:07:30 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)="2328295ee6") r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:30 executing program 5: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:30 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:30 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x7530}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0x1, 0x4) r4 = open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) ftruncate(r4, 0x10099b7) sendfile(r0, r4, 0x0, 0x88000fc000000) 00:07:30 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x0, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) clone(0x3102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000), 0x1c) r4 = fcntl$dupfd(r2, 0x0, r2) r5 = dup2(r4, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) 00:07:30 executing program 5: msgsnd(0x0, &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000a40)=ANY=[]], 0x1, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x1f1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 00:07:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}]]}}}]}, 0x38}}, 0x0) 00:07:30 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) [ 1370.670387][T30829] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 00:07:31 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000100)={r4, 0x7000000}) dup(0xffffffffffffffff) 00:07:31 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x12) 00:07:31 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:31 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) 00:07:31 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 00:07:31 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="090000000000363940d3c7a3ba27660199783b0a82f79b3207b4bcfa7790ac47a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24fd620b2022d5ad63b369aaffe9a6b608", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 00:07:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0x0) 00:07:31 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000100)={r4, 0x7000000}) dup(0xffffffffffffffff) 00:07:31 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) [ 1371.321977][T30863] ptrace attach of "/root/syz-executor.0"[30862] was attempted by "/root/syz-executor.0"[30863] 00:07:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x176, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000280)=[&(0x7f0000ffe000/0x1000)=nil], 0x0, &(0x7f0000000300), 0x0) 00:07:31 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:31 executing program 3: 00:07:32 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:32 executing program 1: 00:07:32 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:32 executing program 0: 00:07:32 executing program 3: 00:07:32 executing program 4: 00:07:32 executing program 0: 00:07:32 executing program 1: 00:07:32 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:32 executing program 3: 00:07:32 executing program 4: 00:07:32 executing program 0: 00:07:32 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:32 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 00:07:32 executing program 1: 00:07:32 executing program 3: 00:07:32 executing program 4: 00:07:32 executing program 0: 00:07:33 executing program 0: 00:07:33 executing program 4: 00:07:33 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) 00:07:33 executing program 1: 00:07:33 executing program 3: 00:07:33 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:33 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$cgroup_int(r0, 0x0, 0x0) 00:07:33 executing program 4: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000100)={0x0, 0x1f, 0x0, 0x0}) 00:07:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xae1d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200047ff, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x240, 0x0, 0x0) 00:07:33 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}}, 0x0) 00:07:33 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) 00:07:33 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160554]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"54abec7338595f275a2292c45ff078f1cbbf04241d1c3421ec9bf61b2221bc18246e74f0001e36735c2ad340bf94ad2a35cfc5d0953a3b2bfd41e2e051c6765447395415a9b05dffbe957e300168dc46f8377130fd28e50a805a6005ab6167da65430e3fcc214d7893c6d91026b5f5192f346a367dbc8ae5df0fd099b4e7a6dadd7f555b203f504eda86e0e8d8c5f319604db5a686750d03bf3a67210063e9a17ca0a1ccd80a7d57cb034b828b784b14c9e5dd70ca358c6819c3df7f4443dced6d9a56bb54eac6538cc61c5e9ef3bda9feeb62cbe4f0e1d1c7f6cbbcada85dbb247b0551773f0734e6f4733db49c22e497557c2f74bfa0e4af9b6228643f180d9f9e1e2bcdf0c35a5b8c388e728b574a066e190800db7b42573f534b8f60e8f756dc4d8dec7ad58b0474fc002851b265cc72099d43115828ac723e73009150fcf7196b4133e2988d4b0fc459e57293afef8837fa0d5d24b984a95cb4bdc48fc9c6e73ebee6b1a3239b2c0eef7c751ccb9f2dcdc3c69173db48df6b5d6e59e6465283de675a8d053e7f3abf86f43006a5a0c6225a589c12583e767b9d817f17bf690444a18e6f8a35b2cb4b60c191efbb16393560b568ee6c82bed918aa4a34b575ac9966b395aafa7fc3b7f467b484eb7d2617e0a240e8acbc2a7e02b650f7d1be52f462be20faa32dd88eb041e2c46b24ed7ab79c10f05296f5461f4ebda25dd7b9908da4be62b0871b169016fab8aae31c7ba45e5b30b7556a062999f43d2dbb9995d2d5de72ffe885bf6bce45caa470933c0906807da75cd38533d8f16d875452c543b259e78215011d2be638eab023513cfe0693d3107e17cfc87e038fc7d1db232d15307fe1d2a818d0a4bde2c53d221111ffa646514dd1fbd3c011b058f79c6fb0a31857ea309018bf72180a434611195c975cf5e285777231b6f158ecaf212183600379fe9762277c13cb6cde9cc0178b883fd1f210180e599f8eb33d33a9ff0f70db1de485b2f2434f2707bf9a54bb6aff687c515c430d5087f4d53a57adf7c97a06dcc61d7733a93dc505d57d8d5c83bf83e345a979307d708756c3f0f1c53a28883b665fda239019f32fc6f07d700d05023e9ef5b66d4b6be57ffd6fe39703fd4eed61535568f47ee51eff8290618e8387d0ba0d00c5bc4585d2d85688af46bb1da08bf42901634cb10e6b03ee276c16980090b59f3c57b428ae0a7ede758c781e2a5a8585e903adde0a0a281a7779a59067d82985655d9138b75042970e11aee4b95b8bcf232473767cca0139b2c2fb40045c6e031950c314015db2524c3f2fe941f249d158a44aa14774e61b2ee185bdfea8f317e440a39533c6db7ffd3c2b626c1e1e088bcebc59526b016cc6a0e4b766c3f00f619d366e5a4378bc15f805a6fb8c9400"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:07:33 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x0, 0x2) r1 = syz_open_dev$usbfs(0x0, 0x0, 0x0) r2 = dup2(r0, r1) pread64(r2, 0x0, 0x0, 0x0) 00:07:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000006f40), 0x2, 0x7f0902fb4a8cae18) 00:07:33 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) 00:07:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000300)="390000001300090468fe585de9e600000700ff3f03000000450001070000001419001a0004001210070000f48aa159", 0x2f}], 0x1) r1 = socket(0x10, 0x800000000080002, 0x4) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 00:07:33 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:33 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[], 0x0, 0x0) 00:07:33 executing program 1: mq_open(&(0x7f0000000100)=',md5sumuser-\x00', 0x842, 0x0, &(0x7f0000000140)={0x1, 0x3, 0xfffffffffffffffa, 0x1002, 0x9, 0x6, 0x1ff, 0x80}) r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = memfd_create(&(0x7f00000001c0)='\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x405, 0x1, 0x2}, 0x27) pwritev(r4, &(0x7f0000000440)=[{&(0x7f0000000480)="a8", 0xfede}], 0x1, 0x81000) mmap(&(0x7f0000009000/0xf000)=nil, 0xf000, 0x800102, 0x102012, r0, 0x0) 00:07:34 executing program 4: socket$key(0xf, 0x3, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$alg(r0, &(0x7f0000000080)=""/95, 0x5f) 00:07:34 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:34 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0x1c) ptrace$cont(0x9, r0, 0x0, 0x40) 00:07:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000080)=""/236, 0x0, 0xec, 0x1}, 0x20) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x16c, 0x244) socket$unix(0x1, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_mr_cache\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80041272, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000540)={@in={{0x2, 0x0, @local}}, 0x0, 0x200000000000025, 0x2, "a77760f5a7645bc43c241d69912d030c43244947a79015f0fe57917cb62a939a7a939ebddfce7bbba4fec2d82818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000002340)=""/4096, 0xde93}], 0x1, &(0x7f0000000200)=""/20, 0x148}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[], 0xffffffdf) 00:07:34 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[], 0x0, 0x0) 00:07:34 executing program 1: socket$inet(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000380)=ANY=[@ANYBLOB="1d1fc6890fa4dae4ac000000000000000000000000230000000001000000000000766cb570ee3c85a7ee34997aee6c3ec223ddf9ef7d292fd9e4ed26cb25a58a93c91ac3067e294c19"]) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x200000000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x84, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_names\x00') setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000040)) mlockall(0x3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000280)='./file0\x00'}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) close(0xffffffffffffffff) 00:07:34 executing program 4: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x800854db, &(0x7f0000000040)=""/86) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000780)={0x4, 0x70, 0x7f, 0xc9, 0x1, 0x3, 0x0, 0x8, 0x28842, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2df7, 0x4, @perf_bp={&(0x7f0000000200)}, 0x0, 0x4, 0xd62, 0xc3621a75a63562e9, 0x5}, r1, 0xd, 0xffffffffffffffff, 0x8) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x1d, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) r3 = socket$inet(0x10, 0x5, 0xe) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000070107031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f00000002c0)=@buf) dup2(r0, r2) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8001, 0x8000) inotify_init1(0x0) 00:07:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x2, 0x14, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}]}, 0x38}}, 0x0) 00:07:34 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:34 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[], 0x0, 0x0) 00:07:34 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x33, &(0x7f0000000000)) 00:07:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x0, @multicast1}, 0x10) 00:07:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1000000000000a}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e26, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 00:07:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x400c12f5, 0x0) 00:07:34 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(r0, 0x1268, &(0x7f0000000140)) 00:07:35 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x140000916, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f0000000040)="b9", 0x1, 0x8000, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000b00)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="f364d959e080b125773818ac153bee79603f675fb842bc9f7cec1b43f244dfa34aae7ce70277eb17b97d66acb4bfd78b624ee32354746768eab624e026ba13d0494b91a86d548660e11805f33e20f08a4e1aaed0fd9510c887b24ff0faa9c5bacc59172bd560c6504f15d6706475cddfe9dbd36ce077279577d023ed8e875757133b743317135f7467caaec9d5525cb20563aaac6548e3b121c3", @ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB="3e581d96bdbd718304a81120b2381918380ea61b760362990fb6a5fe0d867b0c70503bb1e9c03485f38bc04b7de25070b879a23ef65e9a57c23f279f6326f96aaff8d20e4fd6e5987946f5410644efb02088ade12bbf2a795a8c1e800759544ecd5b1ad02053947f52875a0a4975979defe2d36cf48b96b3f34cb0a3b196dddb959ac525617c172bd76f4e4667c22e6c99fa6c9e2d8c73789caa0d41280987370ea50aa4cf16563afa02ab170a3019061cbda7af1610d24ee8039a", @ANYRES16, @ANYRES16, @ANYRES64, @ANYRESDEC, @ANYRES32, @ANYRESHEX, @ANYPTR64, @ANYRES16, @ANYRESDEC], @ANYPTR64=&(0x7f00000009c0)=ANY=[@ANYPTR, @ANYRESHEX, @ANYBLOB="64fa41a860d3d28b386118c85673a693cb673c799e6c950486de85604179197a4cfe1dcc4737c583dc7cc2f5a1af8fef10e7c6e4ab341ae60010000000000000358b2b218db58a9ce3e7e1f319132ab8064224e3dc2b0c1d3e0d2c0508a2ec2ee743fbb33fad01fb0587eadd7c6dd1d985b324256c191b959b3b163cb72d21f018b403764034b8f7edd06d574d56b049ee700fd0e2a72b0699f75c566858526ae28fa63f9f41511bd5fa564dac534c4512bface3683f7756b9c82c56210f6d8c4d3802a93645b17620a5247ee0760000", @ANYRESOCT, @ANYPTR]], @ANYBLOB="b7e73a1d2edd3910dcaeab8c30d059d1eb1665345e000000000000800112130be48d7b1397f69b5aee61355b5ec6a8395a8c5a833203757d4fc84e4bf0b72b148861e32ca695734ab0abab5a26801fa1efd10f4b8737e3750602d2721607a8bb4bee07eb9528c12e1e70aa4855b07d989a8c48d11e4c6cafad2067d98fd2c165ef0fa928881fa85e9e023fd6bbb74bece396aa022590ef45c7f4666193d7531ad97c7a77fcece5b04214b12c00b972a44b0fe2fe2233d9fbf99667588930b3b36eb34d34d28fc93050e20e0a27e9032ed8f207747c7cf6c870de9d800e74131b04d3933f77f091980207359d67cfbbbce18c246bd082af616e", @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES64, @ANYRESHEX=0x0, @ANYRESDEC, @ANYBLOB="fdff24650a06d48c6bd1507ae657bb1f27296b74128d3511f702a8958b96836fe7e06a2991b69c692854cbf3e4b0cb77a8bfaf66ce76817c83392eb3df56f646c6788cc3b7a4bc2d2a277469e2cd8e", @ANYRESDEC, @ANYRES32=0x0], @ANYRESHEX], 0xffffff1d) 00:07:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7d1}, 0x1c) bind$inet6(r0, &(0x7f0000000100), 0x1c) 00:07:35 executing program 1: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0x21, 0x0, 0x0) 00:07:35 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000001c0)={0x20000, 0x0, [0xde3, 0x6542, 0x8, 0x0, 0x0, 0x0, 0x2]}) 00:07:35 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1, 0x0) 00:07:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0xffffffff, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 00:07:35 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:35 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x180000f, 0x11, r2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x41000000000004, 0x1}) 00:07:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8}]]}}}]}, 0x38}}, 0x0) [ 1375.452681][T31066] netlink: 'syz-executor.4': attribute type 17 has an invalid length. 00:07:35 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = accept(r0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7d1}, 0x1c) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7d1}, 0x1c) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) 00:07:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmmsg$inet(r0, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f00000002c0)="a6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000001100)='\v', 0x1}], 0x1}}], 0x2, 0x0) 00:07:35 executing program 4: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000400)='cpu<-&&!\n\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) 00:07:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000380)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 00:07:35 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ac9000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 00:07:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, 0x0, 0x20000, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x0) write$binfmt_script(r3, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1f, 0xd8402) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r4, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f00000001c0)='nodev\\]@\x00', 0x0) keyctl$setperm(0x5, r4, 0x20000000) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000080)=@chain={'key_or_keyring:', r4, ':chain\x00'}) getpid() execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@multicast2, @in=@multicast2, 0x4e24, 0x3, 0x4e20, 0x6, 0xa, 0x0, 0x0, 0x32, 0x0, r5}, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x743234ab, 0x7}, {0xfffffffffffffb09, 0x6, 0x5}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@multicast2, 0x4d2}, 0x2, @in=@loopback, 0x34ff, 0x0, 0x3, 0x81, 0x100, 0x1f}}, 0xe8) r6 = creat(0x0, 0x1d3) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f00000004c0)={0x3, 0x0, [{0x10000, 0xf1, &(0x7f00000002c0)=""/241}, {0x0, 0xaf, &(0x7f00000003c0)=""/175}, {0x2000, 0x3e, &(0x7f0000000480)=""/62}]}) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) 00:07:36 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1, 0x0) 00:07:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmmsg$inet(r0, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f00000002c0)="a6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000001100)='\v', 0x1}], 0x1}}], 0x2, 0x0) 00:07:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:07:36 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 00:07:36 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800000}) 00:07:36 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = accept(r0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:36 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 00:07:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3c7, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) writev(0xffffffffffffffff, 0x0, 0x1e8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r0 = gettid() pipe(0x0) writev(0xffffffffffffffff, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0xfee3) getpid() personality(0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) tkill(r0, 0x1000000000016) 00:07:37 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x41000000000004, 0x1}) 00:07:37 executing program 0: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000ce9ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x40605346, &(0x7f0000642fb4)={0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfd]}) fadvise64(r0, 0x0, 0x0, 0x5) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000240)=0x54) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f0000000140)) r6 = gettid() rt_sigqueueinfo(r6, 0x20, &(0x7f0000000180)={0x30, 0x4, 0x10001}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) [ 1377.311934][T31141] ALSA: seq fatal error: cannot create timer (-22) 00:07:37 executing program 1: 00:07:37 executing program 3: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={0x0, 0xfffffffffffffffd}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x88}}, 0x4) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x400024c, 0x0) 00:07:37 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000240), 0xffffff64, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1, 0x0) 00:07:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xffffffffffffff87, 0x3, 0x0, 0x73, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:07:37 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = accept(r0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:38 executing program 4: 00:07:38 executing program 1: 00:07:38 executing program 3: 00:07:38 executing program 0: 00:07:38 executing program 1: 00:07:38 executing program 0: creat(&(0x7f0000000680)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) fallocate(r0, 0x4000000000000010, 0x7a9a, 0x7fff) 00:07:38 executing program 3: 00:07:38 executing program 3: 00:07:38 executing program 1: 00:07:38 executing program 0: 00:07:38 executing program 4: 00:07:38 executing program 1: 00:07:38 executing program 2: r0 = socket$unix(0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:38 executing program 3: 00:07:38 executing program 5: 00:07:38 executing program 4: 00:07:38 executing program 1: 00:07:38 executing program 0: 00:07:38 executing program 3: 00:07:39 executing program 5: 00:07:39 executing program 3: 00:07:39 executing program 1: 00:07:39 executing program 0: 00:07:39 executing program 4: 00:07:39 executing program 2: r0 = socket$unix(0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:39 executing program 3: 00:07:39 executing program 5: 00:07:39 executing program 0: 00:07:39 executing program 4: 00:07:39 executing program 1: 00:07:39 executing program 1: 00:07:39 executing program 4: 00:07:39 executing program 5: 00:07:39 executing program 0: 00:07:39 executing program 3: 00:07:40 executing program 0: 00:07:40 executing program 3: 00:07:40 executing program 5: 00:07:40 executing program 2: r0 = socket$unix(0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:40 executing program 1: 00:07:40 executing program 4: 00:07:40 executing program 0: 00:07:40 executing program 5: 00:07:40 executing program 0: 00:07:40 executing program 4: 00:07:40 executing program 3: 00:07:40 executing program 1: 00:07:40 executing program 0: 00:07:40 executing program 5: 00:07:41 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:41 executing program 4: 00:07:41 executing program 1: 00:07:41 executing program 3: 00:07:41 executing program 0: 00:07:41 executing program 5: 00:07:41 executing program 0: 00:07:41 executing program 4: 00:07:41 executing program 5: r0 = gettid() r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x42}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x1f, r2, 0x0, 0x0) 00:07:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x4c, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @empty}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x88}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xccf3adb2ab0d5267}, @FOU_ATTR_AF={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000800}, 0x98c58d8ce3ccddd4) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x135, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x1ff) 00:07:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x3b7, &(0x7f0000000000)=""/249, 0xf9}, 0x0) sendto(r0, &(0x7f00000014c0)="aa90e085094452d5abe333a2beafa5288e229c7e6620fffb3bfab4feede0758e4fe5b0f3c74123dd08e0409988588e1c988fa7a2798562ce5d0f326623373733405e68fd621a0626959fc242595df0b3b0e290666d67d4e52e7b69c2eff12814cceba4379175d9865f6fb309606a3fabd4dc850a339e6b4f288d691879a0a0e39ef1c3f1f88ef11977452f696c67f884dfda2798f4a09d3648ff9863cfa3fbacb838e65258b44a246dd36e5b2816a68c8574dd74b1cdf76c2c6e45c369b6214eae4d97ef784d762b609809f33dbdce408869425d99d9ef47abcacd0472348679a92a70063d6410b4e9e7b3210e26089acb3f8ab67982fb135b3c249f00f88fad2ab9f4737a014b9177aa9c0edd18bcdae29394aa0802ed9e9894ff3d902f895781085458575df530fa1f502461bcf8cf8acb650165c4bde93a411ec748a62be651783b016ab9c5b70a5f4aea1aba27680eff4716f6cbf17c3afb81b1fe05e8ca8ea9379fafcb2c2c862128b24da376e1b0d5808822e0a53062c6df43efda64c19fc441b6869322c58539834da582a9cd16165107f55ded075b78198a08f0643657bb322ff299534d2c0c11a6b20d4013e671a7b69ad0eb4f3b7a15143419c79c4a629b02ad892925bbd396e0e14e7692348fcf2bbc645afdd3c5bc4a30673c5c87f7a9654c40f249b6eeac223c4f8bd77364346e33e62b97df1dcf70617a07b4253162ab260005b732e2ce3f9bcce7f104d16e690fa0d9bb80361b6453b4985092e271367bf4f44bd63fd334d958f8ff2e5421c4ebe92f8386c3fb173e7f5b0dc6e5d24a250f5eb6b472e5c171d8202438a0079adefafaed5081801cf706bcd2f8ef84515a49a09c606d9d3f60a32e76ec2b279dc0aec667273b201693c231c5c661c948c945beae11a35f679b7ef7fc514767ba3ce9617fd4b8a0a685ddb6e92b7f13b421fc8482a71dbb73e8f9a41519e7229f97c67f82c996cf0198db220cfe8aa9392b74574abfee84757e74c49b78d06dcea018d951b224eb108081311483f780c7b9ad7ed142022e28b229eb1c36ae8f9e06ea773a484e517cc637fb430f59b68d227d0a996a4e79f78608078c2902a614781d6c322577a638f6bd1b953e9bc0e6b685cb3953892a592221f520bad53f0a106a3ba015a343456960d2a1299e5b5f28fb9e196a3ae5093d4719274c519c4ccd2123baf2d912e5ba01864ade2d14829c298c7198ec905d35b4e09f658d998c5347e739315faa2e6ee9fbaf7f40847efbb5dfc087786082d28b91bc902b632e0c872ef8ef306ba80dc76448758c48d27401a06cdf1fa3bb61ac46c5e973950a7f1378be7d28ceb978d0c433be5087d16ac3f206a4f2481ca40ebcd3e27f12cb1ad1a5ba109e327450e2366360ba86f362c3dd5f8b357291922a4f472ad5ff7625a6b4d94a5c8d3719176043d868de82375a37a44659f50489064be1b5b710505e0dcd46137f62ae114ea452eec404539da2432706bc5887876c4f4f240dc77d4b11829fff10d45ac05f7d7c18643a8c4b02b3f28ec2c67f95f43745055e0c8e4554937e363aaa468445fc3e59affcc24cd3d9559dc119adb2a1f28b1b4c97232275e50ca8b351e312cd057381d6c315804893be790494848766e82903a1046f682b386683828f9e012e9958a26376893d6b3de36bd5f1dd812eec9ce87d2726cc6eeff0ed5f3c9ac11d7e3eb46dc4ef5420b0d92b1b672f5da647b05ee6ee4780312b1a41c408dcded6d38334abc7dc11d880b65d7006cef247df87abc874c3dcc342b2182cdcf76f48147ac63e892172a9295cf706cf7531bd2c792bfa087648b7dc013a165b8edfac12496b5ef03bc5b5588c3598f5e022d5e91d225c93a56c77f3f54cf2ccd909b881d247a5d5812ac9e3c5a22d398783ab7cb42ba8024076c23cfc40e03f8cb79038479fbceb2f0b50edfdccb031314f8cd12540ffc374e0b805fecd43f9106bcd373127dc334ea9eeaf3896d20c740507eebf48c1e1d47fbce9a961bc4afee4590712c75e002d6b0744a3a0688ccde61b55e6a93eaf44ab61252fbd7dbbabde0779cacafdffc35058e087dd7ebd714ea1bde4cb4efa18373c5ae139d649d5195856c6f1e264e9fd60f1b292a146db67709264af98dad46340d170e7c9181495568f5514f39ae9c47d2f21d1bbe73da4b50efdee5c490934eb68a684c5bf4745f5f0ebcab2cc723a3bbd80f38332ff9c9c7ff4c97e2a0b0d6a6f692b670c45c3583949d7a94ff5684ad77f2abf845f035800aca7461cfa28dfa22d212f65529fe4ee541c0a2a3a9bae66835636e4c9920272edfeaf0d493cd896017d2e5e427ff4dec0e94553611623e00bba26ca807cba1d5c3fee597e5f2c8eae496b2dccd382840624834d2cd633ae776c273cdff21c9f0d71d4ec4682ff867bdd4baf1012e25aaf96a601fb1784b6c2f0d62b6d4dd0929417612022393565883a2e61cf3e53153eba8f637a60cafad3e6cd5ad03c02815967f652cd1536c675342240480901c834c826221840a0243c45d8a69a4281f378d23c1a6657b36e1d810e56a85b23f4c26ab24b9d2ae4c594c2ecf51dee8ca64fd1b8fa4da46555ff45fc5f11d67020b4a0915a3ce38e21cdd93235ff8da2dfe4114c6c2cb8abfdefab06b7f3a817d3c7eb31678fa4513b9933f0a49610cc5d1a4e248073f177afa199b1c4c375a54cde4cefebd2ff9465cc99720f80186911011c7ceabfd90a192dfe87ffd439fe8c6402146f834742f130dc82f2b1784f36b0af27c4c4ef", 0x7b5, 0x0, 0x0, 0x0) 00:07:41 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 00:07:41 executing program 5: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x3b9bc0baa9eec98, 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) 00:07:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000740)=@filter={'filter\x00', 0xe, 0x4, 0x13a, [0x0, 0x20000140, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x1d, 0x0, 0x0, 'lapb0\x00', 'ip6erspan0\x00', 'veth1_to_hsr\x00', 'ip6gretap0\x00', @remote, [], @broadcast, [], 0x6e, 0x6e, 0xaa, [], [], @common=@RATEEST={'RATEEST\x00', 0x18, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x1be) 00:07:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="6112a8000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000170600000fff07005606080002000000070600000ee60000bf050000000000002c630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad320100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 00:07:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@routing, 0x8) setsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, 0x0) 00:07:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) write(r0, &(0x7f0000000280)="eb", 0x1) 00:07:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x9f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) 00:07:42 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@routing, 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 00:07:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:07:42 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) getrlimit(0x0, &(0x7f00000000c0)) 00:07:42 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x10, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x85010000, 0xa0008000]}, @mcast2, {[@hopopts={0x2c}], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "96e066", 0x0, "3db41b"}}}}}}}, 0x0) 00:07:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) futex(0x0, 0x81, 0x0, 0x0, 0x0, 0x0) 00:07:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x5) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 00:07:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f00000000c0)='G\xc3$\x05ju\xc3PL\x00\x94\xf7\x1a#\x85x\xa2Br{HS\x00\xd8\x1fl\xfd\vk\xbf\x83\x16m\xca\x0e\xa6\xe2#\x9a\xe5\xc0\x9d\xde\xf2\x01\x00\x00\x00\x00\x00\x00\x00c(\xf2}\x1d', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:07:42 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:42 executing program 1: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg$unix(r0, &(0x7f0000002c40)=[{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000400)="1a2415203ebef32b8b068664cd4dd30815179bbdc9b6122dd75dff340afb67781a97a10a78e1d9390903d4d1ebecebd158c667998b28176b540e257ddcc2468cdbc5c5bc9ffe40e7c191b13a46fdba611376e008c25b7ebf1451b3a24c641f116a31c4f063772cd3d1285c98db88946a31e8929ae4bf2c221d211ee208d7b5ba6fd737a661ecbd809b760f2186c5de27f374", 0x92}, {&(0x7f0000000280)="fb72ea49cb526271ae3d432ef7e8e25975df4be022149a27193ff7e4a49e31b8b454514b24", 0x25}, {&(0x7f00000005c0)="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", 0xbda}], 0x3, &(0x7f0000002bc0)=[@rights={{0x10}}, @rights={{0x10}}], 0x20}], 0x4924924924924cf, 0x80) [ 1382.685560][ T31] audit: type=1326 audit(1572739662.730:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31339 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:07:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000100)={0x0, 0x78, &(0x7f0000000000)="3a052c400663666018cc60c851ff3efc0d46203e8c7103424b4f3aad869301f57d2c726a20f65fa3f908f1f6da0022dd060a0a9e581d2ec1e80a1bbbe0c738b8774c76ffeb687559199e5467dc5b908ba17d1c716b8cdef75b01d2b68622f5aa41a4f7b4c4f30dd236f5aec111297575825dc13df01a40d8"}) [ 1382.799275][ T31] audit: type=1326 audit(1572739662.780:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31332 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:07:42 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x400, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r4}}, 0x48) 00:07:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0x10, 0x8000000100000003, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0) 00:07:43 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) [ 1383.280437][ T31] audit: type=1326 audit(1572739663.330:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31332 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 [ 1383.356450][ T31] audit: type=1326 audit(1572739663.400:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31339 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:07:43 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:07:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000300)=""/137) 00:07:43 executing program 5: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt(r0, 0x29, 0x3a, 0x0, 0x0) 00:07:43 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x816d1) write$P9_RFLUSH(r0, &(0x7f0000000180)={0x7}, 0xffffff38) fsync(r3) 00:07:43 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:43 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0xfffffffffffffffb, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xf17) unshare(0x40040400) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="77827cf354677d4e26f3b1", @ANYRES16=r2, @ANYBLOB="e54e000000000000000008000000180004001400010062726f6164634273742d6c"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18c01020}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="2e495370438417398a2cc519630300c61dc645ca6d8d936d194aa291d1d03ad5525c29078ea7baab39f7da8479c547761202a81138aab05c420bb64b6db2ec4d985265b932b0abe06628f249247050f519de75de8e4e3cdf8ff8d7938f61e6d2609cbc5bf443f45840615a9748bbe223dbd72e88a9e195982b0061ac95045c957f60006037337313d77925f0094b952b79a9c4583482f959b16d0dcf638097efcf79e15c8530c8f3b2833046b27eb9481445397260e83b1451c39851ae", @ANYRES16=r2, @ANYBLOB="00042dbd7000fedbdf25040000002000020004000400080002003f0000000400040008000100000000000400040020000600080001004d0800000400020008000100f40100000800010008000000d400010044000400200001000a004e2000000007ff0200000000000000000000fcff9743aea659debcf022329bd815000140000000200002000a004e2100000004fe8000000000000000000000000000bb00000000080003000400000008000300710900001000010069623a7465736c300000000038000400200001000a004e2200000008fe8000000000000000000000000000bb0900000014000200020000000000000000000000000000002c0004001400010002000000ac14141700000000000000001400020002004e20000000030000000000000000080003000400000034000200040004000800020004000000080001000400000008000100bf4600000400040004000400080002006c0000"], 0x3}, 0x1, 0x0, 0x0, 0x444}, 0x80) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000180)=0x804, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x18200, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) ptrace(0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000001ff0), 0x5, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') [ 1383.589209][T31393] IPVS: ftp: loaded support on port[0] = 21 00:07:43 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:43 executing program 1: r0 = socket(0x1f, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{0xfffffffffffffffe}], 0x1, &(0x7f0000000380)=[@rights], 0x18}, 0x0) 00:07:43 executing program 5: symlink(&(0x7f0000001140)='..', &(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000305, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}, 0x40) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 00:07:43 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) open(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) fsync(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r1, r2, 0x0, 0xfffffffd) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 00:07:44 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:44 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) fsync(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r1, r2, 0x0, 0xfffffffd) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 00:07:44 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000240)=0x99e, 0x4) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_config_ext={0x0, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) dup2(r2, r5) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r6, 0x8919, &(0x7f0000000280)={'irlan0\x00', {0x2, 0x4e23}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x408080, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r8) ioprio_get$pid(0x1, r7) setfsuid(r8) 00:07:44 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:44 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) open(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) fsync(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r1, r2, 0x0, 0xfffffffd) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 1384.344727][T31393] IPVS: ftp: loaded support on port[0] = 21 00:07:44 executing program 4: unshare(0x2040400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) fchmod(r2, 0x0) 00:07:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000170600000fff07005606080002000000070600000ee60000bf050000000000002c630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad320100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 00:07:44 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="a5", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000040)='asymmetric\x00', &(0x7f00000001c0)=@keyring={'key_or_keyring:', r1}) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, r0) 00:07:44 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x10000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) 00:07:44 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) open(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) fsync(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r1, r2, 0x0, 0xfffffffd) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 00:07:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)) 00:07:44 executing program 5: 00:07:44 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:45 executing program 3: 00:07:45 executing program 4: 00:07:45 executing program 5: 00:07:45 executing program 3: 00:07:45 executing program 1: 00:07:45 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:45 executing program 0: 00:07:45 executing program 4: 00:07:45 executing program 3: 00:07:45 executing program 5: 00:07:45 executing program 0: 00:07:45 executing program 1: 00:07:45 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:45 executing program 4: 00:07:45 executing program 0: 00:07:45 executing program 3: 00:07:45 executing program 5: 00:07:45 executing program 1: 00:07:46 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:46 executing program 4: 00:07:46 executing program 1: 00:07:46 executing program 5: 00:07:46 executing program 0: 00:07:46 executing program 3: 00:07:46 executing program 4: 00:07:46 executing program 1: 00:07:46 executing program 5: 00:07:46 executing program 3: 00:07:46 executing program 0: 00:07:46 executing program 4: 00:07:46 executing program 0: 00:07:46 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:46 executing program 5: 00:07:46 executing program 3: 00:07:46 executing program 4: 00:07:46 executing program 1: 00:07:47 executing program 4: 00:07:47 executing program 0: 00:07:47 executing program 1: 00:07:47 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 00:07:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) unlinkat(0xffffffffffffffff, 0x0, 0x0) 00:07:47 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2000) 00:07:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) clone(0x21020013fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='^\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1387.384173][ T31] audit: type=1326 audit(1572739667.430:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31561 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 [ 1387.508576][ T31] audit: type=1326 audit(1572739667.500:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31571 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:07:47 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x10001, 0x4) recvfrom$unix(r0, 0x0, 0x0, 0xc08e, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfffffffffffffd1d, 0x0, 0x0, 0x0) 00:07:47 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000080)) 00:07:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, r1/1000+10000}, 0x10) listen(r0, 0x0) accept4(r0, 0x0, 0x0, 0x0) 00:07:47 executing program 4: getsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x0, &(0x7f0000000000)=0xffff, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='.\x00') 00:07:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x20b) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x4f) connect$inet(r1, &(0x7f0000000400)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:07:48 executing program 4: syz_open_dev$evdev(0x0, 0x3, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0xb2, 0xba, 0x9, 0x8, 0x2304, 0x21f, 0xfbc1, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x45, 0xd8, 0x2a}}]}}]}}, 0x0) [ 1388.082928][ T31] audit: type=1326 audit(1572739668.130:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31561 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:07:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x400445a0, &(0x7f0000000000)=""/217) [ 1388.243764][ T31] audit: type=1326 audit(1572739668.290:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31571 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:07:48 executing program 1: mkdir(0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006f40)=[{{&(0x7f0000000140)=@ipx={0x4, 0x0, 0xddd, "650a48a5e60f"}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0xff03) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_config_ext={0x6fe06381}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x6555cd9d70cb4838) dup3(r2, r3, 0x0) dup2(r1, r4) setfsuid(0x0) [ 1388.346442][T25119] usb 5-1: new high-speed USB device number 22 using dummy_hcd 00:07:48 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x7) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 00:07:48 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:07:48 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6900) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000380), 0x8001) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) sendfile(r1, r2, 0x0, 0x8400fffffffa) sendfile(r1, r2, 0x0, 0xffffffff) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) syncfs(r3) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) dup2(r4, 0xffffffffffffffff) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x7}, 0x10) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) [ 1388.606392][T25119] usb 5-1: Using ep0 maxpacket: 8 00:07:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1388.726578][T25119] usb 5-1: New USB device found, idVendor=2304, idProduct=021f, bcdDevice=fb.c1 [ 1388.735988][T25119] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1388.772820][T25119] usb 5-1: config 0 descriptor?? [ 1388.833358][T25119] dvb-usb: found a 'PCTV HDTV USB' in warm state. [ 1388.840567][T25119] pctv452e: pctv452e_power_ctrl: 1 [ 1388.840567][T25119] [ 1388.848187][T25119] usb 5-1: selecting invalid altsetting 3 [ 1388.854050][T25119] pctv452e: pctv452e_power_ctrl: Warning set interface returned: -22 [ 1388.854050][T25119] [ 1388.869553][T25119] ===================================================== [ 1388.869558][T25119] BUG: KMSAN: uninit-value in number+0x32e/0x1e40 [ 1388.869561][T25119] CPU: 0 PID: 25119 Comm: kworker/0:20 Not tainted 5.4.0-rc5+ #0 [ 1388.869565][T25119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.869568][T25119] Workqueue: usb_hub_wq hub_event [ 1388.869573][T25119] Call Trace: [ 1388.869575][T25119] dump_stack+0x191/0x1f0 [ 1388.869577][T25119] kmsan_report+0x128/0x220 [ 1388.869580][T25119] __msan_warning+0x73/0xe0 [ 1388.869582][T25119] number+0x32e/0x1e40 [ 1388.869585][T25119] ? __msan_poison_alloca+0x158/0x1a0 [ 1388.869588][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869591][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869593][T25119] vsnprintf+0x1e99/0x3210 [ 1388.869596][T25119] ? kmsan_get_metadata+0x39/0x350 [ 1388.869598][T25119] vscnprintf+0xc2/0x180 [ 1388.869600][T25119] vprintk_store+0xef/0x11e0 [ 1388.869603][T25119] ? kmsan_internal_unpoison_shadow+0x42/0x80 [ 1388.869606][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869608][T25119] vprintk_emit+0x2c6/0x860 [ 1388.869611][T25119] vprintk_default+0x90/0xa0 [ 1388.869613][T25119] vprintk_func+0x635/0x810 [ 1388.869616][T25119] ? __msan_poison_alloca+0x158/0x1a0 [ 1388.869619][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869621][T25119] printk+0x180/0x1c3 [ 1388.869623][T25119] dvb_usb_generic_rw+0x8ec/0xea0 [ 1388.869626][T25119] pctv452e_power_ctrl+0x432/0x7d0 [ 1388.869628][T25119] ? pctv452e_tuner_attach+0x310/0x310 [ 1388.869631][T25119] dvb_usb_device_init+0x173f/0x2e10 [ 1388.869634][T25119] pctv452e_usb_probe+0x75/0x170 [ 1388.869636][T25119] ? af9005_rc_decode+0xc10/0xc10 [ 1388.869639][T25119] usb_probe_interface+0xd19/0x1310 [ 1388.869641][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869644][T25119] ? usb_register_driver+0x860/0x860 [ 1388.869646][T25119] really_probe+0xd91/0x1f90 [ 1388.869649][T25119] driver_probe_device+0x1ba/0x510 [ 1388.869652][T25119] __device_attach_driver+0x5b8/0x790 [ 1388.869654][T25119] bus_for_each_drv+0x28e/0x3b0 [ 1388.869657][T25119] ? deferred_probe_work_func+0x400/0x400 [ 1388.869659][T25119] __device_attach+0x489/0x750 [ 1388.869662][T25119] device_initial_probe+0x4a/0x60 [ 1388.869664][T25119] bus_probe_device+0x131/0x390 [ 1388.869667][T25119] device_add+0x25b5/0x2df0 [ 1388.869669][T25119] usb_set_configuration+0x309f/0x3710 [ 1388.869672][T25119] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1388.869675][T25119] generic_probe+0xe7/0x280 [ 1388.869746][T25119] ? usb_choose_configuration+0xae0/0xae0 [ 1388.869749][T25119] usb_probe_device+0x146/0x200 [ 1388.869752][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869755][T25119] ? usb_register_device_driver+0x500/0x500 [ 1388.869757][T25119] really_probe+0xd91/0x1f90 [ 1388.869760][T25119] driver_probe_device+0x1ba/0x510 [ 1388.869762][T25119] __device_attach_driver+0x5b8/0x790 [ 1388.869765][T25119] bus_for_each_drv+0x28e/0x3b0 [ 1388.869768][T25119] ? deferred_probe_work_func+0x400/0x400 [ 1388.869770][T25119] __device_attach+0x489/0x750 [ 1388.869773][T25119] device_initial_probe+0x4a/0x60 [ 1388.869775][T25119] bus_probe_device+0x131/0x390 [ 1388.869778][T25119] device_add+0x25b5/0x2df0 [ 1388.869780][T25119] usb_new_device+0x23e5/0x2fb0 [ 1388.869783][T25119] hub_event+0x581d/0x72f0 [ 1388.869786][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869788][T25119] ? led_work+0x720/0x720 [ 1388.869790][T25119] ? led_work+0x720/0x720 [ 1388.869796][T25119] process_one_work+0x1572/0x1ef0 [ 1388.869798][T25119] worker_thread+0x111b/0x2460 [ 1388.869801][T25119] kthread+0x4b5/0x4f0 [ 1388.869803][T25119] ? process_one_work+0x1ef0/0x1ef0 [ 1388.869805][T25119] ? kthread_blkcg+0xf0/0xf0 [ 1388.869808][T25119] ret_from_fork+0x35/0x40 [ 1388.869810][T25119] [ 1388.869813][T25119] Local variable description: ----actlen@dvb_usb_generic_rw [ 1388.869816][T25119] Variable was created at: [ 1388.869818][T25119] dvb_usb_generic_rw+0xd3/0xea0 [ 1388.869821][T25119] dvb_usb_generic_rw+0xd3/0xea0 [ 1388.869824][T25119] ===================================================== [ 1388.869827][T25119] Disabling lock debugging due to kernel taint [ 1388.869830][T25119] Kernel panic - not syncing: panic_on_warn set ... [ 1388.869833][T25119] CPU: 0 PID: 25119 Comm: kworker/0:20 Tainted: G B 5.4.0-rc5+ #0 [ 1388.869837][T25119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.869840][T25119] Workqueue: usb_hub_wq hub_event [ 1388.869843][T25119] Call Trace: [ 1388.869846][T25119] dump_stack+0x191/0x1f0 [ 1388.869848][T25119] panic+0x3c9/0xc1e [ 1388.869850][T25119] kmsan_report+0x215/0x220 [ 1388.869853][T25119] __msan_warning+0x73/0xe0 [ 1388.869855][T25119] number+0x32e/0x1e40 [ 1388.869857][T25119] ? __msan_poison_alloca+0x158/0x1a0 [ 1388.869860][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869863][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869865][T25119] vsnprintf+0x1e99/0x3210 [ 1388.869868][T25119] ? kmsan_get_metadata+0x39/0x350 [ 1388.869870][T25119] vscnprintf+0xc2/0x180 [ 1388.869872][T25119] vprintk_store+0xef/0x11e0 [ 1388.869875][T25119] ? kmsan_internal_unpoison_shadow+0x42/0x80 [ 1388.869878][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869880][T25119] vprintk_emit+0x2c6/0x860 [ 1388.869882][T25119] vprintk_default+0x90/0xa0 [ 1388.869885][T25119] vprintk_func+0x635/0x810 [ 1388.869887][T25119] ? __msan_poison_alloca+0x158/0x1a0 [ 1388.869890][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869892][T25119] printk+0x180/0x1c3 [ 1388.869895][T25119] dvb_usb_generic_rw+0x8ec/0xea0 [ 1388.869897][T25119] pctv452e_power_ctrl+0x432/0x7d0 [ 1388.869900][T25119] ? pctv452e_tuner_attach+0x310/0x310 [ 1388.869902][T25119] dvb_usb_device_init+0x173f/0x2e10 [ 1388.869905][T25119] pctv452e_usb_probe+0x75/0x170 [ 1388.869908][T25119] ? af9005_rc_decode+0xc10/0xc10 [ 1388.869910][T25119] usb_probe_interface+0xd19/0x1310 [ 1388.869913][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869915][T25119] ? usb_register_driver+0x860/0x860 [ 1388.869918][T25119] really_probe+0xd91/0x1f90 [ 1388.869920][T25119] driver_probe_device+0x1ba/0x510 [ 1388.869923][T25119] __device_attach_driver+0x5b8/0x790 [ 1388.869925][T25119] bus_for_each_drv+0x28e/0x3b0 [ 1388.869928][T25119] ? deferred_probe_work_func+0x400/0x400 [ 1388.869930][T25119] __device_attach+0x489/0x750 [ 1388.869933][T25119] device_initial_probe+0x4a/0x60 [ 1388.869935][T25119] bus_probe_device+0x131/0x390 [ 1388.869937][T25119] device_add+0x25b5/0x2df0 [ 1388.869940][T25119] usb_set_configuration+0x309f/0x3710 [ 1388.869943][T25119] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1388.869945][T25119] generic_probe+0xe7/0x280 [ 1388.869948][T25119] ? usb_choose_configuration+0xae0/0xae0 [ 1388.869950][T25119] usb_probe_device+0x146/0x200 [ 1388.869953][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869956][T25119] ? usb_register_device_driver+0x500/0x500 [ 1388.869958][T25119] really_probe+0xd91/0x1f90 [ 1388.869961][T25119] driver_probe_device+0x1ba/0x510 [ 1388.869963][T25119] __device_attach_driver+0x5b8/0x790 [ 1388.869966][T25119] bus_for_each_drv+0x28e/0x3b0 [ 1388.869969][T25119] ? deferred_probe_work_func+0x400/0x400 [ 1388.869971][T25119] __device_attach+0x489/0x750 [ 1388.869974][T25119] device_initial_probe+0x4a/0x60 [ 1388.869976][T25119] bus_probe_device+0x131/0x390 [ 1388.869979][T25119] device_add+0x25b5/0x2df0 [ 1388.869982][T25119] usb_new_device+0x23e5/0x2fb0 [ 1388.869984][T25119] hub_event+0x581d/0x72f0 [ 1388.869987][T25119] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 1388.869989][T25119] ? led_work+0x720/0x720 [ 1388.869991][T25119] ? led_work+0x720/0x720 [ 1388.869994][T25119] process_one_work+0x1572/0x1ef0 [ 1388.869996][T25119] worker_thread+0x111b/0x2460 [ 1388.869998][T25119] kthread+0x4b5/0x4f0 [ 1388.870001][T25119] ? process_one_work+0x1ef0/0x1ef0 [ 1388.870003][T25119] ? kthread_blkcg+0xf0/0xf0 [ 1388.870006][T25119] ret_from_fork+0x35/0x40 [ 1388.870008][T25119] Kernel Offset: disabled