[ OK ] Started Getty on tty1. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.3' (ECDSA) to the list of known hosts. 2020/04/23 11:36:40 fuzzer started 2020/04/23 11:36:41 dialing manager at 10.128.0.26:34845 2020/04/23 11:36:41 syscalls: 3000 2020/04/23 11:36:41 code coverage: enabled 2020/04/23 11:36:41 comparison tracing: enabled 2020/04/23 11:36:41 extra coverage: enabled 2020/04/23 11:36:41 setuid sandbox: enabled 2020/04/23 11:36:41 namespace sandbox: enabled 2020/04/23 11:36:41 Android sandbox: /sys/fs/selinux/policy does not exist 2020/04/23 11:36:41 fault injection: enabled 2020/04/23 11:36:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/04/23 11:36:41 net packet injection: enabled 2020/04/23 11:36:41 net device setup: enabled 2020/04/23 11:36:41 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/04/23 11:36:41 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/04/23 11:36:41 USB emulation: /dev/raw-gadget does not exist 11:39:07 executing program 0: syzkaller login: [ 205.200540][ T7043] IPVS: ftp: loaded support on port[0] = 21 11:39:07 executing program 1: [ 205.352619][ T7043] chnl_net:caif_netlink_parms(): no params data found [ 205.469860][ T7043] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.486395][ T7043] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.496980][ T7043] device bridge_slave_0 entered promiscuous mode [ 205.517379][ T7043] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.524577][ T7043] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.532402][ T7173] IPVS: ftp: loaded support on port[0] = 21 [ 205.541295][ T7043] device bridge_slave_1 entered promiscuous mode [ 205.604799][ T7043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 205.636037][ T7043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 11:39:07 executing program 2: [ 205.735028][ T7043] team0: Port device team_slave_0 added [ 205.771776][ T7043] team0: Port device team_slave_1 added [ 205.805547][ T7173] chnl_net:caif_netlink_parms(): no params data found [ 205.819673][ T7043] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 205.827234][ T7043] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.855382][ T7043] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 205.880863][ T7043] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 205.888803][ T7043] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.915204][ T7043] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 11:39:08 executing program 3: [ 206.043294][ T7043] device hsr_slave_0 entered promiscuous mode [ 206.098959][ T7043] device hsr_slave_1 entered promiscuous mode [ 206.276764][ T7317] IPVS: ftp: loaded support on port[0] = 21 [ 206.284191][ T7173] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.307092][ T7173] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.323616][ T7173] device bridge_slave_0 entered promiscuous mode 11:39:08 executing program 4: [ 206.363202][ T7349] IPVS: ftp: loaded support on port[0] = 21 [ 206.382643][ T7173] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.404019][ T7173] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.447428][ T7173] device bridge_slave_1 entered promiscuous mode [ 206.535680][ T7173] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 206.559234][ T7173] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 206.645028][ T7173] team0: Port device team_slave_0 added [ 206.655663][ T7389] IPVS: ftp: loaded support on port[0] = 21 [ 206.660531][ T7173] team0: Port device team_slave_1 added [ 206.754081][ T7173] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 206.762065][ T7173] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.789816][ T7173] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 11:39:08 executing program 5: [ 206.811733][ T7173] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 206.821926][ T7173] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.853119][ T7173] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 207.009423][ T7173] device hsr_slave_0 entered promiscuous mode [ 207.066798][ T7173] device hsr_slave_1 entered promiscuous mode [ 207.136405][ T7173] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 207.143973][ T7173] Cannot create hsr debugfs directory [ 207.158087][ T7043] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 207.212564][ T7043] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 207.269184][ T7043] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 207.331245][ T7043] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 207.454182][ T7478] IPVS: ftp: loaded support on port[0] = 21 [ 207.611242][ T7349] chnl_net:caif_netlink_parms(): no params data found [ 207.634340][ T7317] chnl_net:caif_netlink_parms(): no params data found [ 207.829544][ T7389] chnl_net:caif_netlink_parms(): no params data found [ 207.869720][ T7349] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.877105][ T7349] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.885795][ T7349] device bridge_slave_0 entered promiscuous mode [ 207.895471][ T7349] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.903986][ T7349] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.912379][ T7349] device bridge_slave_1 entered promiscuous mode [ 207.975967][ T7317] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.989714][ T7317] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.999419][ T7317] device bridge_slave_0 entered promiscuous mode [ 208.009969][ T7317] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.017260][ T7317] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.026654][ T7317] device bridge_slave_1 entered promiscuous mode [ 208.059718][ T7349] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.095310][ T7317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.111466][ T7349] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.155129][ T7173] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 208.192499][ T7317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.228061][ T7349] team0: Port device team_slave_0 added [ 208.255520][ T7173] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 208.309554][ T7317] team0: Port device team_slave_0 added [ 208.319670][ T7349] team0: Port device team_slave_1 added [ 208.328213][ T7317] team0: Port device team_slave_1 added [ 208.343174][ T7173] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 208.389488][ T7389] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.399730][ T7389] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.408129][ T7389] device bridge_slave_0 entered promiscuous mode [ 208.419205][ T7043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.426586][ T7389] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.433684][ T7389] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.441860][ T7389] device bridge_slave_1 entered promiscuous mode [ 208.475090][ T7173] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 208.551663][ T7043] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.584393][ T7349] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 208.592728][ T7349] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.622901][ T7349] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 208.634757][ T7478] chnl_net:caif_netlink_parms(): no params data found [ 208.653626][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.663030][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.674997][ T7389] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.685598][ T7317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 208.695850][ T7317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.722582][ T7317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 208.734786][ T7349] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 208.745087][ T7349] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.771383][ T7349] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 208.808500][ T7389] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.820284][ T7317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 208.829964][ T7317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.857208][ T7317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 208.873422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.885822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.894785][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.902135][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.959355][ T7349] device hsr_slave_0 entered promiscuous mode [ 208.996672][ T7349] device hsr_slave_1 entered promiscuous mode [ 209.036293][ T7349] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 209.043878][ T7349] Cannot create hsr debugfs directory [ 209.081088][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.089867][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.100700][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.109799][ T2685] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.116924][ T2685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.127115][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.169137][ T7389] team0: Port device team_slave_0 added [ 209.192678][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.202811][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.212197][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.221632][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.231819][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.242895][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.251606][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.261049][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.284380][ T7389] team0: Port device team_slave_1 added [ 209.342018][ T7317] device hsr_slave_0 entered promiscuous mode [ 209.387022][ T7317] device hsr_slave_1 entered promiscuous mode [ 209.446389][ T7317] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 209.454041][ T7317] Cannot create hsr debugfs directory [ 209.520308][ T7389] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 209.528971][ T7389] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.565417][ T7389] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 209.593122][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.601898][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.630711][ T7043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.639400][ T7389] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 209.647000][ T7389] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.673611][ T7389] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 209.699475][ T7478] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.706816][ T7478] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.714985][ T7478] device bridge_slave_0 entered promiscuous mode [ 209.744739][ T7478] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.752962][ T7478] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.761534][ T7478] device bridge_slave_1 entered promiscuous mode [ 209.793694][ T7478] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.846437][ T7478] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.912341][ T7389] device hsr_slave_0 entered promiscuous mode [ 209.976618][ T7389] device hsr_slave_1 entered promiscuous mode [ 210.016199][ T7389] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 210.023946][ T7389] Cannot create hsr debugfs directory [ 210.077094][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.084843][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.153332][ T7478] team0: Port device team_slave_0 added [ 210.160912][ T7349] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 210.198513][ T7349] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 210.244276][ T7349] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 210.301180][ T7349] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 210.353695][ T7173] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.364288][ T7478] team0: Port device team_slave_1 added [ 210.374785][ T7043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.459707][ T7478] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 210.470693][ T7478] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.499410][ T7478] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 210.515014][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.523724][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.533931][ T7173] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.560440][ T7478] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 210.568203][ T7478] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.604331][ T7478] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 210.636784][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.645590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.656219][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.663307][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.716643][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.724785][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.737584][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.746717][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.754943][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.763785][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.789338][ T7317] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 210.837128][ T7317] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 210.930208][ T7478] device hsr_slave_0 entered promiscuous mode [ 210.976590][ T7478] device hsr_slave_1 entered promiscuous mode [ 211.026348][ T7478] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 211.034001][ T7478] Cannot create hsr debugfs directory [ 211.041235][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.051286][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.061096][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.086312][ T7317] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 211.163421][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.177210][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.190968][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.201229][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.210786][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.232246][ T7317] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 211.307824][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.319558][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.328476][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.338685][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.347742][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 211.356755][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.365685][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.374513][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.388316][ T7173] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.431738][ T7043] device veth0_vlan entered promiscuous mode [ 211.460897][ T7389] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 211.523103][ T7043] device veth1_vlan entered promiscuous mode [ 211.533409][ T7389] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 211.584048][ T7389] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 211.637738][ T7389] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 211.701523][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 211.713061][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 211.733663][ T7173] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.762396][ T7349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.771388][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 211.779520][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 211.848055][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 211.857798][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 211.878945][ T7043] device veth0_macvtap entered promiscuous mode [ 211.929449][ T7043] device veth1_macvtap entered promiscuous mode [ 211.948577][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 211.957604][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 211.966587][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.974544][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.982939][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.992271][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.015772][ T7478] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 212.072159][ T7478] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 212.128724][ T7043] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 212.144552][ T7043] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 212.164437][ T7478] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 212.233715][ T7478] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 212.291294][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 212.299997][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.311106][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 212.320239][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.339061][ T7349] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.365341][ T7173] device veth0_vlan entered promiscuous mode [ 212.386379][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.395190][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.405264][ T2685] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.412569][ T2685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.422454][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.432852][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.441911][ T2685] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.449038][ T2685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.457776][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 212.466176][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.476752][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.484763][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.492853][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.513919][ T7173] device veth1_vlan entered promiscuous mode [ 212.548759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 212.562001][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.571269][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.580669][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.590402][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.603079][ T7317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.693609][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 212.702991][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.712733][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.722981][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.802565][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.810622][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.820224][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.829653][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.846633][ T7317] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.864804][ T7349] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 212.877378][ T7349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 212.964572][ T7173] device veth0_macvtap entered promiscuous mode [ 212.984597][ T7389] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.999574][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 11:39:15 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7fff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) prctl$PR_GET_SECCOMP(0x15) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_gettime(r3, &(0x7f0000000000)) [ 213.043949][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.052782][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.085196][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.132135][ T7173] device veth1_macvtap entered promiscuous mode [ 213.143345][ C1] hrtimer: interrupt took 29657 ns [ 213.223604][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 213.238325][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.258735][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.276900][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.285566][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.292759][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.301368][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.311515][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.319946][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.328837][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.337761][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.344830][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.353549][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.368418][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.380727][ T7389] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.419153][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.429400][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 213.437809][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 213.471045][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.484055][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.494295][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.501481][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.510646][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.520249][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.528995][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.536131][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.543961][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.553820][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.562725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.571290][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.590385][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.603468][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.614650][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.633796][ T7173] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.644727][ T7173] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.656675][ T7173] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 213.671008][ T7478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.682376][ T7349] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.696142][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.704871][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.717153][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.728323][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.739701][ T7173] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.755990][ T7173] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.767927][ T7173] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 213.782667][ T7317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.797302][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.827284][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.837192][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.849458][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.859447][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.869932][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.880312][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.890634][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.932010][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.940049][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.950001][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.023725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.033241][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.047396][ T7478] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.064657][ T7389] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 214.076581][ T7389] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.133937][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.143832][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.153807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.162677][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.172067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 214.181393][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 11:39:16 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000001300)=[{&(0x7f0000000140)="666ccc1ceabb71409e75fc20c26a1f927f7bef0b3df213ae3f49f24f8d7941b438176b5145ff76ac4851ea330d84c7799a4c5803b4e8cd160651c3d7f26df4df37d955bcd10ea699add50998d0db69bfd1d2d6ba2980a9c05d51a00b8535853c740158cc9a56e4d6230d73552a4a5a12d57e76119df660bc97061d4f2372ef20105465f7995b87ec3c2f4e42ecb1a64b010402fbcaa24d8c399ef2965b687c5b0ec93bb66dd3b695dbbc5ff2ecc824bb929f088cead435483de38aaafb761c9359b85d11f85c5f6ea42b9cee6b41627ffa4d1cb6e45ed4d16b1d53dc799338eabe6e6c70199fc9b65c5c89447de4b9bd4eec5133f5bb7ae932a091ce0d87fec84dbe9513976eb031d0dc8936b32b8163baaad184f54ccf824b6576474c8ba0cabd69bed3b261cf99fb4fbf313c1c2ae1188c4dcac6b03db04e9a1264b528eb4601c7eb99d8f9a5452e56bae3cf53c1b5de460fc2e1f45d79530cc8c68221049225aaccf91bb076af578327f316648bb7a5454e8b3b5d3f044f4a5ff4c1b02977b38b2149c7cd8f3750037e9c46cb685551b5e59c04d0bfbaf3cdd7f5a0762e2ae8dfd6a46595a3cb2690988862248cce51e6da55857ddca72aec5339c37d2e2f52eabc6d39777c48629f9f17fb001d039789ba8d2fd6e91918176a636650cd7492cb9638effdab535544294bead43116b5c9f61bb097aec402538fa503e1cd83", 0x200}]) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000340)) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="3400000024000b0f00000000000000edff000000", @ANYRES32=r3, @ANYBLOB="00000100ffffffff0000f1ff0900010063616b650000000004000200"], 0x34}}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000000)=r3) [ 214.284207][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.306988][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.343922][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.366898][ T2685] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.374003][ T2685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.381997][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.392022][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.397469][ T8306] Dev loop1: unable to read RDB block 1 [ 214.407599][ T8306] loop1: unable to read partition table [ 214.409347][ T2685] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.420369][ T2685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.423872][ T8306] loop1: partition table beyond EOD, truncated [ 214.430290][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 214.442263][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.447202][ T8306] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 214.457194][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.485973][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.514360][ T7349] device veth0_vlan entered promiscuous mode [ 214.535856][ T8306] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 214.569858][ T7317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.595690][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 214.615467][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.625401][ T8306] Dev loop1: unable to read RDB block 1 [ 214.638553][ T8306] loop1: unable to read partition table [ 214.644397][ T8306] loop1: partition table beyond EOD, truncated [ 214.653285][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.666023][ T8306] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 214.675350][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 214.685389][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.704030][ T7349] device veth1_vlan entered promiscuous mode 11:39:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "00c78dcb014e465eb7000000010027000400"}) r5 = syz_open_pts(r1, 0x464002) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x5) r6 = fcntl$dupfd(r5, 0x0, r0) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f000002f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r4, 0x8008ae9d, &(0x7f0000000000)=""/31) [ 214.756124][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.763959][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.781899][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 214.790991][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.800178][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.809664][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.819062][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.834095][ T7389] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.867754][ T7173] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 214.885127][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 214.897731][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.915094][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.929109][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.952766][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 214.975019][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 214.992063][ T7478] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 215.021338][ T7478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.073160][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.083500][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.097776][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 215.109804][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.144735][ T7349] device veth0_macvtap entered promiscuous mode [ 215.163422][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 215.172830][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.183468][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.192679][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.200758][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.210345][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.219285][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.233370][ T7478] 8021q: adding VLAN 0 to HW filter on device batadv0 11:39:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) [ 215.247098][ T7317] device veth0_vlan entered promiscuous mode [ 215.254824][ T7349] device veth1_macvtap entered promiscuous mode [ 215.322207][ T7317] device veth1_vlan entered promiscuous mode [ 215.385049][ T7349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.416001][ T7349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.436155][ T7349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.447558][ T7349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.461683][ T7349] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 215.492739][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.503309][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 215.528995][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 215.537881][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 215.549720][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 215.563512][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.575496][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 215.609821][ T7349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.653241][ T8337] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 215.684639][ T7349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.685821][ T8337] FAT-fs (loop1): Filesystem has been set read-only [ 215.701811][ T7349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.714038][ T7349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.725611][ T7349] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 215.742079][ T7389] device veth0_vlan entered promiscuous mode [ 215.762300][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.771768][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.782402][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.792053][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.801382][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 11:39:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) [ 215.810938][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.853906][ T7317] device veth0_macvtap entered promiscuous mode [ 215.865766][ T7389] device veth1_vlan entered promiscuous mode [ 215.920351][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.930994][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.947444][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 215.955941][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 216.066199][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.075108][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.085695][ T7317] device veth1_macvtap entered promiscuous mode [ 216.174101][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 216.183522][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.231998][ T7478] device veth0_vlan entered promiscuous mode [ 216.248554][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.259288][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 11:39:18 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000480000000000e1ff95000000000000002ba7e1d30cb599e83f24a3aa6bb3019c13bd23212fb56f040026fbfefc41056bd8174b7960317142fa9ea41d8123751c4e345c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6939fc404000000c788b277beee1cbf9b0a4def23d410f6accd3641110bec4e90a6341965c39e9ef8f6e3968f200e011ea665c45a3449abe802f5ab3e89cf6c06000000b8580218ce740068720000074e468eea3fd2f73902ebcfcf49822775985bf313405b433a8acd715f5888b2007f00000000000000000100000000000000010000000000000053350000000034a70c2ab40c7cf5691db43a5c000000000000000031000000000000000000e75a89faff01210cce39bf405f1e846c12423a164a33e680846f26ad7add65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d617de7a6520655a805608df4d431623c850af895abba14f6fbd7fb5e2a431ab9142f3a06d55740a46792cbf4609646b6c5c29647d2f950a959cf9938d6df8600a62e96b7cb8e52cbdc2ba9d580609e31c3fa90e7e57a79d6fce424c2200af6c7784a1975fa657de38a3a61e44a9ecab19bdfb15a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6edc71df48dca02113a38300cabf2b5543ffc1669557b3819d8c396d2c2361629d1822f722ec23812770d72cd00600000f7889b8c7044f563a1f68d4efe81a406cd497cc87cac6f45a6922ded2e295fdbc463f747c08f4010586903500"/600], &(0x7f0000000140)='GPL\x00'}, 0x48) r3 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_MSG_GETFLOWTABLE(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000ec0)={0x318, 0x17, 0xa, 0x5, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HOOK={0xbc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vlan0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ip6gre0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'nr0\x00'}, {0x14, 0x1, 'veth1\x00'}, {0x14, 0x1, 'ip6gre0\x00'}, {0x14, 0x1, 'geneve0\x00'}, {0x14, 0x1, 'vxcan1\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x401}]}, @NFTA_FLOWTABLE_HOOK={0x130, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ip6tnl0\x00'}, {0x14, 0x1, 'hsr0\x00'}, {0x14, 0x1, 'virt_wifi0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0xcc, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}, {0x14, 0x1, 'veth1_to_team\x00'}, {0x14, 0x1, 'bond_slave_0\x00'}, {0x14, 0x1, 'vlan1\x00'}, {0x14, 0x1, 'veth0_to_team\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'wg1\x00'}, {0x14, 0x1, 'veth1_vlan\x00'}, {0x14, 0x1, 'macvtap0\x00'}, {0x14, 0x1, 'erspan0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3}]}, @NFTA_FLOWTABLE_HOOK={0xf0, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bridge_slave_0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'team_slave_0\x00'}, {0x14, 0x1, 'veth1_to_team\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'caif0\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'veth1_vlan\x00'}, {0x14, 0x1, 'ip6_vti0\x00'}, {0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'bond0\x00'}, {0x14, 0x1, 'tunl0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x318}}, 0x4000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x1002) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xe8, r7, 0x8, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa, 0x3}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x11}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'wg2\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc56}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private2={0xfc, 0x2, [], 0x1}}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0x24000051) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000500)={0x2}) r8 = socket$kcm(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) [ 216.284884][ T7317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 216.306274][ T7317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.369551][ T8349] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 216.410087][ T8349] FAT-fs (loop1): Filesystem has been set read-only [ 216.422762][ T7317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 216.434466][ T7317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.446265][ T7317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 216.456955][ T7317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.469493][ T7317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 216.491239][ T7478] device veth1_vlan entered promiscuous mode [ 216.508163][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 216.520366][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 216.529709][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.539051][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 216.567255][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.594657][ T7317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 11:39:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) 11:39:18 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) getsockopt$inet_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)=0xfffffffffffffd6c) [ 216.619676][ T7317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.635548][ T7317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.662596][ T7317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.675024][ T7317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.694796][ T7317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.739100][ T7317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 216.779292][ T7389] device veth0_macvtap entered promiscuous mode [ 216.795888][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 216.804213][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 216.813772][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 216.835016][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 216.880045][ T7389] device veth1_macvtap entered promiscuous mode [ 216.923314][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 216.953412][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 216.971137][ T8363] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 216.979889][ T8363] FAT-fs (loop1): Filesystem has been set read-only [ 216.991428][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.034750][ T7478] device veth0_macvtap entered promiscuous mode [ 217.181767][ T7478] device veth1_macvtap entered promiscuous mode [ 217.206007][ T7389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.223054][ T7389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.237851][ T7389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.286125][ T7389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.296743][ T7389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.311581][ T7389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.332364][ T7389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.344009][ T7389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.358390][ T7389] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 217.409119][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 217.426729][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.446924][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 11:39:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x2, 0x1, 0x5c}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 11:39:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x4, 0x54}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) pipe(0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2de96f20"], 0x4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) [ 217.470002][ T7389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.494343][ T7389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.515804][ T7389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.534198][ T7389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.556443][ T7389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.573860][ T7389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.584844][ T27] audit: type=1804 audit(1587641959.712:2): pid=8382 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir148818910/syzkaller.q6mqQW/2/bus" dev="sda1" ino=15769 res=1 [ 217.612111][ T7389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.643278][ T7389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.659090][ T7389] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 217.673129][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.695490][ T3530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.752520][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.781336][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.803058][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.813828][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.824176][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.836059][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.847681][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.861121][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.873126][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.885499][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.899336][ T7478] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 217.913667][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.924539][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.992300][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.015676][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.035722][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.060675][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.081640][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.094201][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.105020][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.118129][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.129129][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.139893][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.152456][ T7478] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.164004][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.179692][ T2783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.389240][ T27] audit: type=1804 audit(1587641960.532:3): pid=8378 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir148818910/syzkaller.q6mqQW/2/bus" dev="sda1" ino=15769 res=1 11:39:20 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000a00)=[{0x0}], 0x1, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000a40)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xec100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x80000000000000}, 0xb20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xd8d0668c81aa2fa3) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 218.423238][ T27] audit: type=1804 audit(1587641960.532:4): pid=8387 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir148818910/syzkaller.q6mqQW/2/bus" dev="sda1" ino=15769 res=1 [ 218.517891][ T8391] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 11:39:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) 11:39:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000400)=0x1, 0x4) r1 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@empty, 0x0, 0x6c}, 0x2, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000080)=""/243) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 11:39:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$packet(0x11, 0x2, 0x300) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any='access=any'}, {@access_uid={'access'}}], [{@euid_eq={'euid'}}]}}) 11:39:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x33}, [@ldst={0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5000000}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@int=0xb, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x7ff, 0x0, 0x1, 'queue0\x00', 0x80000000}) socket$inet6_udp(0xa, 0x2, 0x0) 11:39:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'\x00', 0x4002}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x1002) r6 = dup3(r2, r4, 0x80000) setsockopt$CAN_RAW_ERR_FILTER(r6, 0x65, 0x2, &(0x7f0000000000)=0x5, 0x4) 11:39:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000100)={r5}, 0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r5, 0x8}, 0x8) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0xb9b4}}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r7) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x4004743d, &(0x7f0000000680)='&@[\x00') [ 218.868831][ T8408] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 218.904722][ T8408] FAT-fs (loop1): Filesystem has been set read-only 11:39:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x0) 11:39:21 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="bf"], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x6800011, 0x10, r1, 0x0) connect(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80) 11:39:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x0) 11:39:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$packet(0x11, 0x2, 0x300) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any='access=any'}, {@access_uid={'access'}}], [{@euid_eq={'euid'}}]}}) 11:39:21 executing program 3: setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7ff}}, 0xe8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_FWMARK={0x8, 0x12, 0x3e000}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=@mpls_getroute={0xc4, 0x1a, 0x400, 0x70bd28, 0x25dfdbfd, {0x1c, 0x20, 0x20, 0xff, 0xfe, 0x3, 0x0, 0x3, 0x2100}, [@RTA_OIF={0x8}, @RTA_NEWDST={0x84, 0x13, [{0xfffff}, {0x5}, {0x4758}, {0x2}, {0x2, 0x0, 0x1}, {0x6}, {0x6, 0x0, 0x1}, {0x5}, {0x1000, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2}, {0x2, 0x0, 0x1}, {0x99}, {0xffffb, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0xffff}, {0xffff, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xfffc1, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xe1}, {0x4}, {0x6}, {0xff}, {0xf6beb, 0x0, 0x1}, {0x2}, {0x1}, {0x2, 0x0, 0x1}, {0xa2af}, {0x6}, {0x360}]}, @RTA_MULTIPATH={0xc, 0x9, {0xbb04, 0x7, 0x1f}}, @RTA_DST={0x8, 0x1, {0x101}}, @RTA_OIF={0x8}]}, 0xc4}}, 0x840) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000024000b0f000049b040edc1229f990000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b65000000000c0002000800120000e00300"], 0x3c}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local, 0x4e20, 0x1f, 0x4e24, 0x0, 0xa, 0x20, 0xd927991a975bfc69, 0x33, r3, r5}, {0x10001, 0x5, 0x3ff, 0x9, 0x1, 0xc4, 0x401, 0x100}, {0x1, 0x6c, 0x2, 0x60000000}, 0x81, 0x6e6bc0, 0x0, 0x0, 0x2, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d2, 0x32}, 0xa, @in=@broadcast, 0x3507, 0x3, 0x3, 0x5, 0xfffffff8, 0xff, 0x80000001}}, 0xe8) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="0207000902000000a8a988ea0000007ba79574354cdddb4e667263a7192ff58ab16f88b9668b145e6313f3ee41e2f28204de687a25340b61976cae3a9a9e90785afd31885d362411ef23cd8f5f819b383803f6c871ceef4aa6dac6ac95ded04e549caab8d914916ee79d501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a0000000000000000000000781f1a3ea4c057bfc8af28e2b90e1d3dd7fe6e38d2d29be9a5adffffff7f0000"], 0x10}}, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) 11:39:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa10000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3b}], 0x3, 0x0, 0x0, 0x3b2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = timerfd_create(0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000100)="35ca") perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x1000}, 0x4) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r7, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r7, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r7, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:39:21 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x8, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x250840, 0x321) write$P9_RSTAT(r0, &(0x7f0000000000)={0x64, 0x7d, 0x1, {0x0, 0x5d, 0x401, 0x1, {0x4, 0x4, 0x7}, 0x8400000, 0x400, 0x9, 0x2, 0x3, '@-%', 0x18, 'selinux})selinuxcpuset{,', 0x6, '+self$', 0x9, '\x00\x00\x00\x00\x00\x00\x00\x00\x00'}}, 0x64) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) getpid() sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2286000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="300000000d14070000007000ffdbdf2508000100010000000800010000000000080001000000000008003e003b0000004497604146236699dc25b0615bb3aad9b92800f7c778670c0081274c2b29753e6f395eb163b30f8926fb2c9a6b27870da7060f1006ea431bf385722900a6310e4365f7060de9b7323c0b4fa2cb3b5967236006000000d7267411f702d1d12b1d"], 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 11:39:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x0) 11:39:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x0) 11:39:22 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x8, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x250840, 0x321) write$P9_RSTAT(r0, &(0x7f0000000000)={0x64, 0x7d, 0x1, {0x0, 0x5d, 0x401, 0x1, {0x4, 0x4, 0x7}, 0x8400000, 0x400, 0x9, 0x2, 0x3, '@-%', 0x18, 'selinux})selinuxcpuset{,', 0x6, '+self$', 0x9, '\x00\x00\x00\x00\x00\x00\x00\x00\x00'}}, 0x64) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) getpid() sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2286000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="300000000d14070000007000ffdbdf2508000100010000000800010000000000080001000000000008003e003b0000004497604146236699dc25b0615bb3aad9b92800f7c778670c0081274c2b29753e6f395eb163b30f8926fb2c9a6b27870da7060f1006ea431bf385722900a6310e4365f7060de9b7323c0b4fa2cb3b5967236006000000d7267411f702d1d12b1d"], 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 11:39:22 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000100)={r5}, 0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r5, 0x8}, 0x8) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0xb9b4}}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r7) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x4004743d, &(0x7f0000000680)='&@[\x00') 11:39:22 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000100)={r5}, 0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r5, 0x8}, 0x8) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0xb9b4}}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r7) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x4004743d, &(0x7f0000000680)='&@[\x00') 11:39:22 executing program 3: setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7ff}}, 0xe8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_FWMARK={0x8, 0x12, 0x3e000}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=@mpls_getroute={0xc4, 0x1a, 0x400, 0x70bd28, 0x25dfdbfd, {0x1c, 0x20, 0x20, 0xff, 0xfe, 0x3, 0x0, 0x3, 0x2100}, [@RTA_OIF={0x8}, @RTA_NEWDST={0x84, 0x13, [{0xfffff}, {0x5}, {0x4758}, {0x2}, {0x2, 0x0, 0x1}, {0x6}, {0x6, 0x0, 0x1}, {0x5}, {0x1000, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x2}, {0x2, 0x0, 0x1}, {0x99}, {0xffffb, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0xffff}, {0xffff, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0xfffc1, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0xe1}, {0x4}, {0x6}, {0xff}, {0xf6beb, 0x0, 0x1}, {0x2}, {0x1}, {0x2, 0x0, 0x1}, {0xa2af}, {0x6}, {0x360}]}, @RTA_MULTIPATH={0xc, 0x9, {0xbb04, 0x7, 0x1f}}, @RTA_DST={0x8, 0x1, {0x101}}, @RTA_OIF={0x8}]}, 0xc4}}, 0x840) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000024000b0f000049b040edc1229f990000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010063616b65000000000c0002000800120000e00300"], 0x3c}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local, 0x4e20, 0x1f, 0x4e24, 0x0, 0xa, 0x20, 0xd927991a975bfc69, 0x33, r3, r5}, {0x10001, 0x5, 0x3ff, 0x9, 0x1, 0xc4, 0x401, 0x100}, {0x1, 0x6c, 0x2, 0x60000000}, 0x81, 0x6e6bc0, 0x0, 0x0, 0x2, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d2, 0x32}, 0xa, @in=@broadcast, 0x3507, 0x3, 0x3, 0x5, 0xfffffff8, 0xff, 0x80000001}}, 0xe8) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="0207000902000000a8a988ea0000007ba79574354cdddb4e667263a7192ff58ab16f88b9668b145e6313f3ee41e2f28204de687a25340b61976cae3a9a9e90785afd31885d362411ef23cd8f5f819b383803f6c871ceef4aa6dac6ac95ded04e549caab8d914916ee79d501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a0000000000000000000000781f1a3ea4c057bfc8af28e2b90e1d3dd7fe6e38d2d29be9a5adffffff7f0000"], 0x10}}, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) 11:39:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) ftruncate(0xffffffffffffffff, 0x8200) ftruncate(r8, 0x0) 11:39:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getdents64(0xffffffffffffffff, &(0x7f0000000340)=""/230, 0x20000426) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 11:39:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) ftruncate(0xffffffffffffffff, 0x8200) ftruncate(r8, 0x0) 11:39:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getdents64(0xffffffffffffffff, &(0x7f0000000340)=""/230, 0x20000426) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 11:39:23 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000100)={r5}, 0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r5, 0x8}, 0x8) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0xb9b4}}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r7) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x4004743d, &(0x7f0000000680)='&@[\x00') 11:39:23 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000100)={r5}, 0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r5, 0x8}, 0x8) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0xb9b4}}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r7) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x4004743d, &(0x7f0000000680)='&@[\x00') 11:39:23 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x6, 0x2, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 11:39:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) ftruncate(0xffffffffffffffff, 0x8200) ftruncate(r8, 0x0) 11:39:23 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x1, 0x0, 0x0, "cc76cdcf5dcf3db12002200000000000000100"}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) setsockopt$inet_tcp_buf(r2, 0x6, 0xd, &(0x7f00000001c0)="6615c842911028dcff3514e3ff10a4a5df2fb6820690fc607ecf77699f88756ad88b22974fd6660cb3caf9527b7f55c9936d8e6ee1247a70716009aa89e3eb001952a853d1a86a1a923de015ac1f1a34edc4bae0292893a20675e9cb5a08e7d7faa060b45e91a63d45e137c8ae6cbb0c", 0x70) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @empty}}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x2710, 0x3, 0x106000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000ffffffff6d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1354803, 0x0) 11:39:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x9, 0x6, 0x500, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x40) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) getitimer(0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r4, 0x7}, &(0x7f00000000c0)=0x8) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='mountinfo\x00') r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r5, 0x0, 0x20000000000000d8) 11:39:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x8200) ftruncate(0xffffffffffffffff, 0x0) 11:39:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000100)={r5}, 0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r5, 0x8}, 0x8) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0xb9b4}}, r6, 0x0, 0xffffffffffffffff, 0x0) close(r7) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x4004743d, &(0x7f0000000680)='&@[\x00') 11:39:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x8200) ftruncate(0xffffffffffffffff, 0x0) 11:39:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x8200) ftruncate(0xffffffffffffffff, 0x0) 11:39:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x9, 0x6, 0x500, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x40) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) getitimer(0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r4, 0x7}, &(0x7f00000000c0)=0x8) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='mountinfo\x00') r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r5, 0x0, 0x20000000000000d8) 11:39:25 executing program 5: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f00000000c0)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000000)={0x3b, @dev={0xac, 0x14, 0x14, 0x39}, 0x4e24, 0x1, 'lblcr\x00', 0x2, 0x4, 0x49}, 0x2c) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x103040, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x6) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) sendto$inet(r0, &(0x7f0000000180)="f0268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 11:39:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r7 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x8200) ftruncate(r7, 0x0) 11:39:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x9, 0x6, 0x500, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x40) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) getitimer(0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r4, 0x7}, &(0x7f00000000c0)=0x8) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='mountinfo\x00') r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r5, 0x0, 0x20000000000000d8) 11:39:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r7 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x8200) ftruncate(r7, 0x0) 11:39:25 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) keyctl$get_security(0x11, r2, 0x0, 0x0) 11:39:25 executing program 5: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f00000000c0)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000000)={0x3b, @dev={0xac, 0x14, 0x14, 0x39}, 0x4e24, 0x1, 'lblcr\x00', 0x2, 0x4, 0x49}, 0x2c) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x103040, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x6) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) sendto$inet(r0, &(0x7f0000000180)="f0268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 11:39:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r7 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x8200) ftruncate(r7, 0x0) 11:39:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x9, 0x6, 0x500, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x40) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) getitimer(0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r4, 0x7}, &(0x7f00000000c0)=0x8) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='mountinfo\x00') r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r5, 0x0, 0x20000000000000d8) 11:39:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x9, 0x6, 0x500, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x40) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) getitimer(0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000100)={r4}, 0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r4, 0x7}, &(0x7f00000000c0)=0x8) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='mountinfo\x00') r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r5, 0x0, 0x20000000000000d8) 11:39:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) fchdir(0xffffffffffffffff) r7 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x8200) ftruncate(r7, 0x0) 11:39:26 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) keyctl$get_security(0x11, r2, 0x0, 0x0) 11:39:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) fchdir(0xffffffffffffffff) r7 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x8200) ftruncate(r7, 0x0) 11:39:26 executing program 5: pipe2(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) rt_sigreturn() r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x210880, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/cpuinfo\x00', 0x0, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x420, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e23, @multicast2}}, 0x0, 0x5, 0x1}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xd}, 0xffff8001}}, 0x0, 0x0, 0x21}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6, @remote, 0x10000}}, 0x0, 0x5, 0x9}, 0xd8) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x8) r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r5, &(0x7f0000000380)={0x1a, 0x1, 0x0, 0x9, 0x0, 0xfc}, 0x10) 11:39:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xfffffffffffffeb4}], 0xb3e, 0x0, 0x0, 0xfffffe41) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x1002) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000140)={0x0, 0x0}) wait4(r7, &(0x7f00000001c0), 0x8, &(0x7f00000003c0)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x42800, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x1ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:39:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x1002) bind$vsock_stream(r4, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)={0x5c, r6, 0x409, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24008000}, 0x0) 11:39:27 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) keyctl$get_security(0x11, r2, 0x0, 0x0) 11:39:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) fchdir(0xffffffffffffffff) r7 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r8, 0x8200) ftruncate(r7, 0x0) 11:39:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x1002) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000000)={r0, 0xfffeffff}) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0x30, 0x30, 0x1, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_gact={0x18, 0x1, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) 11:39:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000024000b0f00"/20, @ANYRES32=r3, @ANYBLOB="00faaa08ffffffff000000000900010063616b650000000054b800000000000000e003000cd95b98cc465961d3f57b5caaa43c4f7f32a3245e471fa0977e8d78dc8b1d12fa213df2e7e9c79ccd9ca1d1e767504e06b21b626abc5f5d8476257707c1192cb9b9170e7f1c87e98ff9ab273f46a871bdd2049209d47d89a4cbcda1e36721a2ef58d992ec98289121234465c01d609a22292b717e23edef30c82cc76f0b248dafef0e223dac1741d1de9d82e315e2217b4f46cd1926143275a7b15b79ad7ca687e5cfcb74be44257436"], 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', r3}) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x220000a0}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, 0x0, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0xffffffffffffffff}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0xffffffffffffffff}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x54}, 0x1, 0x0, 0x0, 0x14}, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r1, 0x4000, 0x0, 0x4) 11:39:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1bd840, 0x90) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1002) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2f000000040000002100000000000000060000000000000006097e26e2999e45a2e1f2731772000000000000000700"], 0x2f) r3 = memfd_create(&(0x7f0000000440)='/s\xcb2\x1d\b\x00\xe8\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xca\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa6,\xa6<\x13\xfe\x04\x00\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1\x06\x00\x00\x00\xe93\xf2\xd6\x03\'\xaa(\x8f\xaf\f7\n$\x03\x89\xf7\xb6\xed\xd0\xd2\x18j\x8f\x9b\xd0\x8a\xda\\;\xb6\xf4\'y\x17?\xc5\x90\xcc\xe9\xdc\xa7\aY\x95\x8b\xcf\xdd \t\x8emJ\x7f\xe4m\xe6T\xe9\xa4=\'\xf4Y\x92$O_\xf6\xb6\x1ce\xd0R\xcf\x1c\xbd\x03\x9a\xca\xc1\xff\xa5_\xfb\xd0n\xc0\xc6\x05\xa8\x9c\xf5\xa7\xde\xf8&5\xefD\x04\x160\xafy\x02\\\x15F\x00\x00:>\xf8\xa2|\xc3\x06\xcf\x19\xf0\x82\xb3\xfep\xf8\xd8L\xe3&\x97\x82\x15/\xcbT\a\xfd\x96\x90H3\x95\aE\xf0D0C~1\xe8\xaa\xf4\xf4\xe2\xf7\xba\xea\x00^k\f\xc00,\xd8\xc4\xd6~\x16\xcb\t\xac\x16\xb5`\xc3@\xd2C\x8e\xe6\x7f\xdb\xe3\xdcQy\x85\x9e9\x95\x94\xd9c;{\x1f\x84w\xd2\xa3`\x8cm\x8d\xc9\xd5\xad\x88\x96\xd9\xa9RA\xb6\x960dtQ\xe8\xd0\xdayA\x89\x87\xffQ\x84\xe3U\x80+\xd1,!\x87\xf9\xac\xc5\xea\xf8\x8b\xbd\x98\x8d\x9a\x15\x02\xc2\xb5\x95\xba<%\xcd\xf7%\xf4\xbe\x02\x1cN\xbc\xbb\xe3\x81\xe2\xe1T\x8f}\xf1\x03Y\xbbo\xb5\x8e\xe7Cy\xfeg\xe2\xab\xf4\xef\xb9\xb4\xcc\xc8\xa5\x8a\x1b\x1b,\xc8\x9b\xd1\xd6\'\x0e\xea\x9d\xa3z\xf9\xde\xa2U\xe0RD\x96\\b\xef6\xf9\x873\xa7\xf7\x19\xb4\xe5\x94\x84\xd5\xe1\xa5\x04\x1d\xfeQw\x86^\xff\xd2t\xc6h{\xf3CR\xb0:\xee\xf2\x88T\xdf#]\xdc\xf1a\xebNm{1\x9b\x9b\x84\xc4\r\x102\xaa%k\x98hP\xb0\x80\xf3\xdc\xd1\xea`_\xc5\x84\x19l\xf1X\xc8\xce\xcf\xeeREK\x1b\xde;\xf3gO\x93h\xd0\xd9\xcb\x1d\xfd\xbbV\xe2\x16l\by\xe3%\xca\xe2\x0e\xbe8\xcc', 0x3) r4 = open(0x0, 0x4c2400, 0x153) ftruncate(r3, 0x40003) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r5, 0x0, 0x1002) ioctl$SNDRV_PCM_IOCTL_PAUSE(r5, 0x40044145, &(0x7f0000000000)=0x7c) r7 = shmget(0x2, 0x2000, 0x200, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_STAT(r7, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x587, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}, 0x801, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000200)=0x3) sendfile(r0, r3, 0x0, 0x2008000fffffffe) ioctl$KVM_GET_ONE_REG(r4, 0x4010aeab, 0x0) [ 225.411084][ T8797] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 11:39:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) 11:39:27 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) keyctl$get_security(0x11, r2, 0x0, 0x0) 11:39:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000300)={0x200, 0x2, 0xfffffff7, 0x1e51, 0x40}, 0x14) r2 = dup(r0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snd/timer\x00', 0x10000) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000611700000000436aa5e88333f14316ef11b54bd075ea00009500000000000000a82827adaf1fceb08ec25382e0571f220e9e1d50e630d3d408ee5c4149e5255a51679e9f43170e3cd841fd17c53556bae12dced0ac4e80c9b51dda30c3ae9c80cdef25fb7a4a41e0080723931024fff670c6e982d0e2070679f0bdb24361d88c070344058a089b904ff43b9120"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_DEL_STATION(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000000000000000140000000500130100000000060012010047c500b69bef15c7b31c9fbfa21a1a3b5fadb61740a7b78ec3a3e0b873c495c1eb7e08d2c947e2405ef4cb6e8d5fbe2725ed69711dca"], 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r4, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}]}, 0x20}}, 0x8084) 11:39:28 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) 11:39:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) [ 226.134472][ T8842] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 11:39:30 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socket(0x2, 0x3, 0x0) 11:39:30 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r5, 0x0, 0x1002) ioctl$VIDIOC_G_PRIORITY(r5, 0x80045643, 0x2) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r3, &(0x7f0000000140)={@val, @void, @eth={@random="9f84bb57964b", @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x6, 0x0, @loopback, @empty}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {'`'}}}}}}}, 0x3b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0d4bd6ad27797165dca8e9445d9831adeb4b94699bff3ee753090368eab52223bc05b6f97d6c28425044c10405820a38757ce51276082eb3c5656cd69bb9fc7c670a653ae9dd9a7eb585d6b096173c03561c143051be43708dbf37caa08c56427e2acb"], 0x63) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 11:39:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) getsockopt$inet_dccp_int(r3, 0x21, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@link_local={0x3}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "bf6e00", 0x8, 0x3a, 0x0, @remote, @mcast2, {[], @echo_request}}}}}, 0x0) 11:39:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r5, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4008001) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) 11:39:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x1132}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1002) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x1ff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024000000001000000000000000", @ANYPTR, @ANYBLOB="b6c5c91960b03899000000000900010063616b65000000000c000200080012000ce0030074ab865c445aacf0d85fe17abf492c7950a273302b570f2841f300004157360c686a3f30cf90e24f1ed67abb63ee429b055e6f08ebbda603b12dcc0094a6eeb67cc470ee6ade9d786f647129eae590b49a84dc673054c2ef214013a2e6a9458db7fe61f5beeabf6032ac7150ad458b2aaf0f13afcc1b61687c036039ab12d46a65a9472e8756e713272c79e8fbc14fc3961e34ab79d45c0177c164785f17832e66ce474e75ef4c42fffe36050203bc3abd445bbfaea7d69adc5f2de5f368bacdf0b4c8f9100a17d8127d33c82d3a977f462e19544689baecaee85e196f079ee1d4a31581308190cbaa839c86e9e16c8b29d3b14b"], 0x3}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@loopback, @in6=@private2, 0x4f24, 0x6, 0x4e21, 0x7, 0xa, 0x0, 0x90, 0x1, r5, r8}, {0x81, 0x0, 0x3, 0xa, 0x2, 0x4, 0x2db332e2, 0x80}, {0x5, 0x100000000, 0xfffffffffffffe7c, 0x3}, 0x20, 0x6e6bb1, 0x0, 0x0, 0x1, 0x2}, {{@in=@multicast2, 0x4d3, 0x32}, 0xa, @in=@multicast1, 0x3501, 0x0, 0x0, 0xc6, 0x7f, 0x9, 0x4}}, 0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305829, &(0x7f0000000040)=0x8000) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 11:39:31 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) 11:39:31 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socket(0x2, 0x3, 0x0) [ 229.629972][ T8907] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 229.722320][ T8907] FAT-fs (loop1): Filesystem has been set read-only 11:39:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0xb00000000065808, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x80082102, &(0x7f0000000380)=r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x3c, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_UNACK={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x3c}}, 0x0) sendfile(r3, r1, 0x0, 0x100000001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r7, 0x0, 0x1002) getsockopt$EBT_SO_GET_INIT_INFO(r7, 0x0, 0x82, &(0x7f0000000240)={'nat\x00'}, &(0x7f00000002c0)=0x78) sendfile(r6, r5, 0x0, 0x1002) sendmsg$NFNL_MSG_COMPAT_GET(r6, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0xb, 0x801, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x20000010) r9 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 11:39:32 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) 11:39:32 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/l2cap\x00') ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000080)=0xc02) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x5, 0x21, 0x5, 0x4, 0x5, 0x2, 0x6, 0x70, 0xfffffffffffffffe}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@check_strict='check=strict'}]}) 11:39:32 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socket(0x2, 0x3, 0x0) [ 230.362422][ T8938] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 230.371298][ T8938] FAT-fs (loop1): Filesystem has been set read-only [ 230.419343][ T8933] ISOFS: Unable to identify CD-ROM format. 11:39:33 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) move_pages(0x0, 0x496, &(0x7f0000000040)=[&(0x7f0000002000/0x1000)=nil], &(0x7f00000000c0)=[0x1], &(0x7f00000000c0), 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000100)={0x7fff, 0x2, 0x0, [{0xea6, 0xfff, 0x5, 0x6, 0x2, 0x8f, 0x3}, {0x200, 0x4, 0x20000000000000, 0x6, 0x7f, 0x2}]}) 11:39:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) 11:39:33 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socket(0x2, 0x3, 0x0) 11:39:33 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="6400000010000555000000000071ffaf00020000", @ANYRES32=0x0, @ANYBLOB="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"], 0x64}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_FWMARK={0x8, 0x12, 0x3e000}]}}]}, 0x3c}}, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_FWMARK={0x8, 0x12, 0x3e000}]}}]}, 0x3c}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_FWMARK={0x8, 0x12, 0x3e000}]}}]}, 0x3c}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe8) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x4) sendmsg$nl_route_sched(r0, &(0x7f0000004c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=@newtaction={0x4610, 0x30, 0x4, 0x70bd28, 0x25dfdbfd, {}, [{0x1464, 0x1, [@m_skbmod={0x1054, 0x7, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x401}, @TCA_SKBMOD_DMAC={0xa, 0x3, @dev={[], 0x43}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x6}, @TCA_SKBMOD_DMAC={0xa}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7f}, @TCA_SKBMOD_SMAC={0xa, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}]}, {0x1004, 0x6, "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"}}}, @m_ct={0x94, 0x1, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_CT_MARK={0x8, 0x5, 0x5}]}, {0x7c, 0x6, "9402e86c4c781747510c9d14ab6d7a597780f9edd99756c00e3683c830de04f9174547d7e26f3c57488b90086420f9f5a0d0a0504573ea464af2889e4ec8e1e8225230571a44cc202403ea02ce49f2c396ddbdcf3798848695038e9268917f43f12b90da865be8d6b2aad66d064007c814a7ef74967bd0ef"}}}, @m_connmark={0x1a4, 0xe, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0xc8, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x6, 0x2, 0x8, 0x280}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfc, 0x0, 0x10000000, 0x81, 0xdc0}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x9, 0x80, 0x0, 0x1f, 0x3}, 0x81}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8a, 0x4, 0x1, 0x3, 0xffe00000}, 0x1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x9, 0x6, 0x670c, 0xff}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x3ff, 0x20000000, 0x6, 0x2}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0xdf5c, 0x7, 0x5}, 0x3f}}]}, {0xc5, 0x6, "2b2dd3355e3d96bdafea3531915f19c7678d099011c6cdced5a6781fd03d7f2813866d750411cb5929f20e2891741a91aa24dbc48d1c60b746df5f7d0da379081ef691bb43296c58eb31cb161c1c73846513cf41481503b045e1381f419be1f030676566936c5bc970a86cb1caeee8cecaa623c3d88e9260d2a23bca220dcb48e8c9f0f5dd6433648218da14cf0b44a9d222f2c5a26cb3ac41645a4940ef8558c4b66ecfd32e9d4c9b67d48461867cec4d0717839f063fde5eaf6d18c7a494ad0b"}}}, @m_vlan={0xb8, 0x1f, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x3c, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x100, 0x7, 0x4, 0x7, 0x6}, 0x1}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x73f85f58, 0x3f, 0xffffffffffffffff, 0x0, 0x1f}, 0x1}}]}, {0x69, 0x6, "b555ea793418fd25efea4440f4416a2be2cf5f389aee8828608a93af2677a82312b55a077f47f091cd3a4854c04e50752537998457d05ccc81ad9c05570bb4d44d27016a1c1dd7f0ac62a643eeec86fcc5f8530d79c22215004279617943abf39ff2c150c2"}}}, @m_mirred={0x11c, 0x7, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0xc4, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x290683f8, 0x8000, 0x20000000, 0x8, 0x7e6}, 0x1, r1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0x54a2, 0x10000000, 0x2, 0x3}, 0x6, r4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xfa, 0x6, 0x20000000, 0x0, 0x10000}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x8, 0x0, 0x1, 0x5, 0xff}, 0x3, r7}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xc, 0x7a, 0x10000000, 0x10001, 0x8}, 0x2, r9}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x800, 0x7, 0x1, 0x4, 0x80}, 0x1, r10}}]}, {0x48, 0x6, "db5af8a1dadd5f05fdaf9d33c4e3fb3b1da9d28bc90ecc57a756777e3a70c45abce117a99679f9f563817bb47018d596c91ded2387e4c85d0411ec1cb28d2b064f614085"}}}]}, {0x2e08, 0x1, [@m_ctinfo={0xc8, 0xd, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x9, 0xa5db, 0x1, 0x1ff}}]}, {0x9a, 0x6, "12101a71459a58a5f7be74f176f34c6c13112e8259f19468f83432976ec5c2c8d0ad10e9af726a0f89d4b7f53cddc3d7ab5c03ee6c2181694bf4588b8b9da0254a74a149dff48d4d85324e88991c32957cb3828b073b6abbdf318d15b56419d18453192f762e45bd6ce48e8c329b80488fd9f913329b40b3ec6e14fbdd2f9b6fe50d7273703e8eea43b0f9ef70bc3573e32e927c78cc"}}}, @m_ct={0xdc, 0x4, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x4}, {0xcc, 0x6, "18187ddbd70ec191adf21af86fc16d1fc709977ac21353b9dbadf649c2da2686b2ebf46e7c05f95a619f81b07411ccb606e7f641f352413b3bbc39158fbf5c6ce6329650db0a21be1ed842da8a7746bc0ba8aeccde701cfeee65882f77c41886055b96b6eaf99636108f0d1ca7a2c43455874c35a3ab1b06e1485f3dddecc0248abb4c53c9614add5f3b26295baf854c6f084bb1a35809bcf2583c502b0ea0b14070964c073fd826f6ea16a6cb6ad3787ade8bba8455583e90047beb5da1162784470ba1faa4e28f"}}}, @m_pedit={0x2c60, 0x19, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x2b6c, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe80, 0x2, {{{0x6, 0x50, 0x1, 0x7dd, 0x5}, 0x9, 0x3, [{0x8, 0x80000001, 0x3, 0x0, 0x8, 0x7}, {0xffff, 0x9, 0x5, 0x6, 0x4, 0x8001}, {0xfffffffa, 0x401, 0x7fffffff, 0x8, 0x400, 0x4}, {0x40, 0x6, 0x3ff, 0x3, 0x6, 0x9}]}, [{0x7, 0xffff, 0x1, 0x699, 0x1, 0x10000}, {0x6, 0x8, 0xfffffff7, 0xfffffffd, 0xcdd, 0xff}, {0x2, 0x1, 0xff, 0x486, 0x6b6e, 0xdbe}, {0x8001, 0xae5, 0x0, 0x4, 0x7fff, 0x69}, {0x0, 0x80000001, 0x2b60, 0x8, 0x800, 0x1}, {0x0, 0x7ff, 0x47, 0x7ff, 0x3}, {0x1f, 0x4, 0x2, 0x401, 0x80, 0xb3}, {0x2, 0x5, 0x6, 0x9, 0x81, 0x9}, {0x800, 0x10001, 0x7ff, 0x5, 0x4, 0x2}, {0x9, 0x9, 0x6, 0x8, 0x0, 0x2f6}, {0x7ff, 0x1800, 0x0, 0x4, 0x200, 0xfff}, {0x9, 0x0, 0x3, 0x101, 0x33, 0x2}, {0x4, 0x1f, 0x9, 0x7, 0x5, 0x3}, {0x2, 0x3, 0x401, 0x4, 0x3, 0x8e1}, {0x3, 0x9, 0x20000000, 0x401, 0x3, 0x48e}, {0x9, 0x5, 0x5, 0xb9d, 0xc8, 0xffffff81}, {0xfffff000, 0x7, 0x5, 0x6, 0x101, 0x5}, {0x5, 0xd10, 0x6, 0x7, 0xfffffffa, 0x4}, {0x90, 0x5, 0x80000000, 0x3, 0x7, 0xad}, {0x4, 0x7, 0x0, 0x8000, 0xd69e, 0x5}, {0x10001, 0x9, 0x7d5e943c, 0x1, 0x6, 0x1}, {0x3, 0x7, 0x9, 0x3, 0x81, 0x6883}, {0x401, 0x40, 0x800, 0x1, 0x7, 0xfffff801}, {0x80000001, 0x1def, 0x0, 0x5, 0x4, 0x6}, {0x6, 0x7fffffff, 0xffff9e88, 0x8, 0x401, 0x6}, {0x8, 0x821, 0x7fffffff, 0x1a4, 0x16105170, 0x3ff}, {0x0, 0xfff, 0x800, 0x20, 0x4, 0x1f}, {0xffffffb2, 0x7f, 0xfffffffe, 0x102f, 0xbfa, 0x5}, {0x7, 0x80000000, 0x3, 0x9, 0x6, 0x7}, {0x1, 0x5, 0x1, 0xa8, 0x7, 0x1}, {0x1, 0x6, 0x8, 0x8, 0x9, 0x77}, {0x8f4, 0x6, 0x0, 0x7, 0x9, 0x2}, {0x80, 0xe9, 0xfffffc00, 0x80000001, 0x7fffffff, 0x1f}, {0x1, 0x10001, 0x1, 0x9, 0x6, 0x4}, {0x40, 0xfffffffb, 0xa8d, 0x3f, 0x7fffffff, 0x1}, {0x3f, 0x8, 0x3ff, 0x6, 0x2, 0x10000}, {0x8, 0xff, 0x9, 0x1, 0x9, 0x51800}, {0x7fff, 0x101, 0x9, 0xfffffffa, 0x5, 0x4}, {0x6, 0x7, 0x3, 0xffffffff, 0x5, 0x7}, {0x7, 0x3, 0x0, 0x2, 0x7, 0x8}, {0x81, 0xfffffff7, 0x80000001, 0x7, 0x81, 0xffffbab4}, {0xfffffff7, 0xfffeffff, 0x6, 0x7, 0xb1b, 0x7}, {0x80000000, 0x3, 0x0, 0x1, 0xdf37, 0x8}, {0x7, 0xb655, 0x7fff, 0x8001, 0x7fffffff, 0x8}, {0xffffffff, 0x5, 0x0, 0x1, 0x6, 0x8}, {0x7, 0xffffffe0, 0x7, 0x1, 0x5, 0x1ff}, {0x8, 0x800, 0x6, 0x800, 0x0, 0x4a}, {0x10001, 0x8, 0x8000000, 0x1, 0x0, 0x20}, {0x4, 0x6, 0xe5, 0x31, 0x1ff, 0x10000}, {0x6, 0x8, 0x2, 0x20, 0x10000, 0x427}, {0x1, 0x2, 0x7, 0x4b, 0x1933d596, 0x7}, {0x2, 0xfd15b3b, 0x8000, 0x8001, 0x7, 0x1000}, {0x20, 0x200, 0x2, 0xfff, 0xbc7a, 0x2}, {0x80000001, 0x3, 0x6c, 0xfffffffe, 0x9, 0x3}, {0x6, 0x8, 0x9, 0x15, 0x8, 0x20}, {0x1, 0x80000000, 0x8, 0x3ff, 0x3e, 0xff}, {0xf, 0x1, 0xc8, 0x6, 0x7, 0x2}, {0x9, 0x7f, 0x64, 0x1f, 0x6, 0x9d54}, {0x9, 0x6, 0x9, 0x3, 0x80000000, 0x1}, {0xffffffff, 0x3, 0x42, 0xf8b, 0x5, 0x9}, {0xffffffff, 0xa8, 0x6, 0x0, 0x7}, {0x73, 0x9, 0x7f, 0x96, 0x1, 0x8001}, {0x165c, 0x81, 0x3, 0xfe48, 0xffffffcd}, {0x6eb3dbfd, 0x3, 0x4, 0x1, 0x60, 0xffffffff}, {0x7, 0x3, 0x0, 0x9, 0x14000, 0x8}, {0x7fffffff, 0x100, 0x4, 0x9, 0x4, 0x10001}, {0x8000, 0x1, 0x8000, 0x2, 0x1, 0x80000000}, {0x4a, 0x800, 0x5a26, 0x9, 0x3, 0x1178}, {0x9, 0x3, 0x2, 0x0, 0xfffffffb, 0x3}, {0x0, 0x6, 0x7, 0x7f, 0x40, 0x9}, {0x5, 0x6, 0x65f, 0x7, 0x7, 0x1}, {0x9, 0x29, 0x58d2, 0x0, 0x0, 0xfffffffb}, {0x9, 0xa08, 0xc0ca, 0x4, 0x77, 0x7}, {0x1000, 0x6, 0xe00, 0x81, 0x80000000, 0x7fff}, {0x9, 0x691e, 0x5, 0x6d2e084a, 0x1ff, 0x3d}, {0x3, 0x7, 0x400, 0xffff8001, 0x1, 0x8}, {0x4, 0x7, 0x8c9e, 0x4, 0x0, 0x7ff}, {0x1, 0x40, 0x7, 0xfffff000, 0x55, 0x4}, {0x6, 0x2, 0x1, 0x3f, 0xa4c7, 0x5}, {0x80000001, 0x1, 0x44, 0x80000000, 0x400, 0x8}, {0xddca, 0xea33, 0xffffffc8, 0xfc9a, 0x9, 0x1}, {0x9, 0x0, 0x9822, 0x3ff, 0x4, 0x7}, {0x6, 0x92b, 0xc0, 0x6, 0x100, 0xffff79f2}, {0x8, 0x1, 0x20, 0x1, 0x80}, {0x9, 0x4, 0x401, 0x8, 0x9, 0x8}, {0x401, 0x8001, 0x6, 0x6, 0x4, 0x34bd}, {0x8000, 0xa18a, 0x9b6, 0x7f5f5cac, 0x0, 0x8}, {0x1f, 0x3, 0xfff, 0x3, 0x4, 0xfffffff8}, {0x2c3, 0x2, 0x1ff, 0x1, 0x8001, 0x8000}, {0x400, 0xf2, 0x4, 0xffffff7f, 0xd0e, 0x2}, {0x1, 0xffffffff, 0x5, 0x12a, 0x7ff, 0x4}, {0x2, 0x8001, 0xff, 0x1, 0x7f, 0x2}, {0x3ff, 0x1, 0x1, 0x4, 0x9, 0x1}, {0x8, 0x7, 0x2, 0xf48, 0x7fffffff, 0x6}, {0x1, 0x1, 0xd4b, 0x100, 0x61ea, 0x8}, {0xffffffff, 0x3e0, 0x2, 0x401, 0x7, 0x93}, {0x1f359733, 0x6, 0xe0b, 0x6, 0x10001, 0xc5e4}, {0x7f, 0x4e7, 0x7fff, 0x4, 0x5, 0xffffffe0}, {0x8, 0x4, 0x3, 0x0, 0x6, 0x2}, {0x1f, 0x1, 0xffffffff, 0x6c, 0xb9, 0x8}, {0x8, 0x9, 0xfff, 0x10001, 0x3, 0x1ff}, {0x5, 0x0, 0xa861, 0xe495, 0x6, 0xfffffff8}, {0x200, 0x7fffffff, 0x8, 0x5, 0x7, 0x9}, {0xd292, 0x101, 0x9, 0x1f1d, 0x1, 0x2d0331af}, {0x2, 0x9, 0x7152, 0x7, 0x8000, 0x2}, {0x9, 0x9, 0x4, 0x40, 0xe58, 0x5de}, {0x0, 0x7fff, 0x100, 0x9, 0xfffffffc, 0x7}, {0x772, 0x9, 0x0, 0x8000, 0x9, 0x8}, {0xca6, 0x101, 0x0, 0x52a, 0x6, 0x1}, {0x80000000, 0x600000, 0x3f, 0x4e, 0x6, 0xdfbf}, {0xf3, 0xfffffff7, 0x1, 0x100, 0x6, 0x4}, {0x9, 0x1, 0x9, 0x1, 0x1}, {0x0, 0x1, 0xfff, 0x4, 0x3, 0x35a7}, {0x9e, 0xffffffc0, 0x81, 0xfffffffa, 0x20}, {0x8, 0x9, 0x7fff, 0x401, 0x3ff, 0x2ba}, {0x38a1, 0x4, 0x5, 0x1, 0x3ff, 0x3}, {0x0, 0x21d, 0x80, 0xffffffef, 0x80000000, 0x3ed2}, {0xc513, 0x8, 0x80000001, 0x683f, 0x7, 0x4}, {0x1, 0x6, 0x8, 0x80, 0x8, 0xff}, {0xcab, 0x0, 0xff, 0x7f, 0x4, 0xffffffff}, {0x89f8, 0x0, 0xffffffe1, 0x8, 0xfff, 0x401}, {0x2, 0x7, 0x4, 0x595, 0x1, 0x80000001}, {0x401, 0x1, 0x2, 0x6, 0x10000, 0xb0b}, {0x767, 0x1, 0x8000, 0x4e12, 0x7f, 0x7}, {0x9, 0x9, 0x5, 0x1, 0x6d2}, {0x0, 0x9f7e, 0x0, 0x3ff, 0x10001, 0x14cc}, {0x4, 0x1, 0x9, 0x3f, 0x200, 0x40}, {0x6, 0x9, 0x100, 0x8, 0x7de, 0x6}], [{0x4}, {0x5}, {0x2}, {0x0, 0x1}, {0x1}, {0x3, 0x1}, {0x5}, {0x3}, {0x1, 0x1}, {0x2}, {0x4, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1}, {0x2}, {0x0, 0x1}, {0x1, 0x1}, {0x2}, {0x4, 0x1}, {0x2, 0x1}, {0x4}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {0x55c081095e082617}, {0x5, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {}, {}, {0x4}, {0x1, 0x1}, {}, {0x3}, {0x1, 0x1}, {}, {0x3}, {0x1}, {0x5}, {0x0, 0x1}, {0x3}, {0x4, 0x1}, {}, {0x3, 0x1}, {0x2}, {0x5}, {0x0, 0x1}, {0x1}, {}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x5}, {0x2}, {0x4, 0x1}, {0x4}, {0x1, 0x1}, {0x3, 0x1}, {0x5}, {0x4}, {0x2, 0x1}, {0x5f3bd57890714bd6, 0x1}, {0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x5}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4}, {0x1, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x1}, {0xe35d2a2dbe56194, 0x1}, {0x2}, {0x0, 0x1}, {0x2}, {0x5}, {0x1}, {0x1}, {0x1, 0x1}, {}, {0x5}, {}, {0x3, 0x1}, {0x2, 0x1}, {0x7}, {0x5}, {0x2, 0x1}, {0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3}, {0x5, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x1}, {}, {0x2}, {0x0, 0x1}, {0x0, 0x1}, {0x5}, {0x2, 0x1}, {0x3}, {0x1, 0x1}, {0x4}, {0x4}, {0x3, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x2}, {0x3, 0x1}, {}, {0x0, 0x1}, {0x4, 0x1}, {0x1}, {0x3}, {0x5}, {}, {0x0, 0x1}, {0x3}, {0x5, 0x1}]}}, @TCA_PEDIT_PARMS={0xe50, 0x2, {{{0xce, 0x1, 0x0, 0x659507e2, 0x1}, 0x7, 0x0, [{0x3ff, 0x45c, 0x1, 0x6, 0x6, 0x9}, {0x68a, 0xffffff7f, 0xffff, 0x81, 0xfffffffc, 0x4}]}, [{0x7, 0xfffffffa, 0x7ff, 0xbf, 0x7, 0x25f}, {0xffff3780, 0x80000000, 0x7, 0x6, 0x0, 0xffff}, {0x7, 0x4, 0x4, 0x7ff, 0x6, 0x9}, {0x41, 0x7fffffff, 0x1, 0x10001, 0x543, 0xfffffbff}, {0x1, 0x0, 0xa688, 0x10001, 0x22, 0xffffffff}, {0xffffff4c, 0x0, 0xdf, 0x7, 0x0, 0x7}, {0x5, 0x5, 0x8, 0x200, 0x1, 0x200}, {0x1710, 0xffffffff, 0x3, 0x3, 0x1, 0xa30}, {0x200, 0x0, 0x1, 0x1, 0x7ff, 0x9db}, {0x1, 0x0, 0xffff8000, 0x2, 0x4, 0x6}, {0x7, 0xff, 0xffffffff, 0x6, 0x2, 0x5}, {0xffffffff, 0x58be, 0x8}, {0x80000001, 0x478, 0x0, 0x96, 0x8ab8, 0x200}, {0x94, 0x7f, 0x9, 0x2fac, 0x7, 0x1}, {0x8, 0x1, 0x3, 0x40, 0x4, 0x101}, {0x3, 0x6817, 0xff, 0x4, 0x1f7, 0x7}, {0x327a9cfb, 0x6, 0x7f, 0x7, 0x6, 0x1}, {0x1, 0x6, 0x1, 0x2, 0x7, 0x8}, {0x6, 0x0, 0x7bd4, 0xa4, 0x8, 0x8}, {0x40, 0x8, 0x4b82, 0x7, 0xff, 0x3}, {0x401, 0x6, 0xfffffea2, 0x7fff, 0xa36, 0x4}, {0x9, 0x9, 0x8e4, 0x8, 0x7}, {0x2400, 0xfe5, 0xe7, 0x4, 0x80000000, 0x200}, {0x3, 0x2, 0x1, 0x3f, 0x8, 0x3}, {0x2, 0x5, 0x6, 0x467, 0x7, 0x46f}, {0x2, 0x3, 0x7, 0xdfdf, 0x3, 0x1}, {0x1ff, 0x2, 0x7, 0x3, 0x20, 0x2}, {0x2, 0xffff, 0x1, 0x7, 0x101, 0x2}, {0xfffeffff, 0x14, 0x97, 0x3, 0x3, 0x6}, {0x1c2, 0x7fffffff, 0x10000, 0x8, 0x6ddc54f3, 0x80000001}, {0x70a0, 0x3, 0x3f, 0x0, 0x6, 0x80}, {0x6, 0x5, 0x2, 0x200, 0x2, 0x1}, {0x4, 0xfffffffa, 0x401, 0x1c800000, 0x5, 0x8}, {0x8001, 0x3, 0x10, 0x10000, 0x6, 0x8}, {0x8000, 0x401, 0x8, 0xffff, 0xc5e, 0x2}, {0x7ff, 0x8, 0x3, 0x3, 0x7fffffff, 0x3}, {0x1, 0xfa, 0x101, 0xffffff9c, 0x6, 0xea}, {0x200, 0x80000000, 0x0, 0x7, 0x0, 0x7b}, {0x9, 0x3, 0x2ed, 0x2, 0x1, 0x7}, {0x200, 0x1f, 0x2, 0x10000, 0x1, 0x3}, {0xffffffff, 0x4, 0x7, 0x4bb5, 0x8000, 0x8}, {0x5, 0x7fff, 0xf809, 0x815, 0x8001, 0x1}, {0x4, 0x800, 0xa, 0x6, 0x2, 0x1}, {0x622, 0x8, 0x1fe0000, 0x81, 0x200, 0x3}, {0x9, 0x8, 0x0, 0xb7, 0xf9a9, 0x8}, {0x0, 0x6, 0x77, 0x1, 0x20, 0x4}, {0x7, 0x8, 0x0, 0x1, 0x7, 0x40}, {0x0, 0xfffffffe, 0x8, 0x0, 0x8, 0x4}, {0x9, 0x7ff, 0x4, 0x2, 0x2, 0x8}, {0x4a7, 0xfff, 0x2d, 0x1, 0x7ff, 0x80000000}, {0x8000, 0xfffffffc, 0x1ff, 0x0, 0x7, 0x80000001}, {0xfffff332, 0x8, 0xbc8d, 0x1ff, 0x4, 0xe0f}, {0x2, 0x20, 0xe91e, 0x10000, 0x8, 0x1}, {0xfb79, 0x8001, 0x8, 0x5, 0x7, 0x1}, {0xa61, 0xf58c, 0x1, 0x4, 0x8001, 0x4c}, {0x7fffffff, 0x8000, 0xfffffa79, 0x101, 0x0, 0x89}, {0xfffffeff, 0x4, 0x2, 0x9, 0x9, 0x1bb6}, {0x7ff, 0x245, 0x2, 0x7fff, 0x7, 0x7fff}, {0xfffffffa, 0x10000, 0x2, 0x96ba, 0x7, 0xffff}, {0x8000, 0x800, 0x9, 0x3f, 0x7, 0xe000000}, {0xfffffff8, 0x3075, 0x0, 0x8, 0x4}, {0x5, 0x1, 0xffff, 0x1, 0x80000000, 0x6}, {0x9, 0x1000, 0x6, 0x3, 0x6, 0x16}, {0x3f, 0x6, 0x80000001, 0x9, 0x5, 0x9c5}, {0x1f, 0x7, 0x4, 0x200, 0x3f, 0xffffffff}, {0x1ff, 0x5, 0x1, 0x1, 0x1, 0x20}, {0x6, 0xfff, 0x3, 0x2, 0x4, 0x40}, {0x9c0b, 0x6, 0x1, 0x0, 0x7fff, 0x480000}, {0xffff, 0x6, 0x3ff, 0x1, 0xc, 0xa7fe}, {0x0, 0x69, 0x2, 0x2, 0x6, 0x9b}, {0xe73, 0xff, 0x7, 0x81, 0xce4, 0x687000}, {0x3, 0x3, 0x6, 0x5, 0x3, 0xffffffff}, {0x7, 0x0, 0xb8, 0xf85, 0x4, 0x8}, {0x1f, 0xffff, 0x9, 0x5, 0x401, 0x80}, {0x4, 0x80000000, 0x1, 0x6, 0x576, 0x5}, {0x8, 0x2, 0x6, 0x4000000, 0x3, 0x3}, {0x80000000, 0x0, 0x8, 0x0, 0x101, 0x1}, {0xfff, 0x101, 0x5, 0x1, 0x401, 0x2}, {0x9, 0x8, 0xad1a, 0x1, 0x8001, 0xe66a}, {0xe07, 0x81, 0x6, 0x3bebdf84, 0x4, 0x80000000}, {0xffffffff, 0x8, 0x200, 0x6, 0xfffffffb, 0xffffffc0}, {0xffffffe0, 0x8001, 0x3, 0x8, 0x7, 0x7f}, {0x9, 0x3, 0x100, 0x2, 0x1ff, 0x5}, {0x5, 0x962, 0x2, 0x1f, 0x9, 0x9}, {0x3, 0x21a8, 0x6, 0x2, 0x2, 0x20}, {0x6, 0x7f, 0x0, 0x6, 0xef9, 0x80000001}, {0x800, 0x9, 0x5, 0x9, 0xfffffffc, 0x3}, {0xae, 0x8, 0xbb0, 0x8, 0xfffffff9}, {0xe5, 0x1, 0xc436, 0x4, 0x41d, 0x80000001}, {0x5, 0xffff, 0x1ff, 0x3924b9dd, 0x0, 0x5a}, {0x400, 0x1, 0xffffffff, 0x2, 0xffff, 0xffffff74}, {0x4, 0x401, 0xffffffff, 0x1, 0x8, 0x63}, {0xfffffffc, 0x2, 0x0, 0x69, 0x200, 0x79aa}, {0x101, 0x5, 0x1, 0x10000, 0x4, 0x1000}, {0x9, 0x5, 0x100, 0x4, 0x5, 0x9}, {0x0, 0x6, 0x8001, 0x7, 0xb7, 0xfffffffa}, {0x176, 0x6, 0x4d, 0x5e4c, 0x7bb9, 0x1}, {0x1, 0x3, 0x200, 0x8, 0x3, 0xfffffff8}, {0x0, 0xd25, 0x6, 0x2, 0xffff, 0xfffffff8}, {0x2, 0x2, 0x3, 0x7fff, 0x1, 0x5}, {0xf037, 0x6, 0x0, 0x20, 0xffffff7f, 0xa3c}, {0x8, 0x1, 0x6, 0x9, 0x3, 0x77}, {0x43a, 0x1, 0x2, 0x9ea3, 0x101, 0x1}, {0xae, 0x0, 0x6, 0x1ff, 0x2, 0x9}, {0x5, 0x4, 0x4, 0x28000000, 0x400, 0x539}, {0x40, 0x5, 0xd26, 0x200, 0xd2, 0x1}, {0x4, 0x80000001, 0x742, 0x1874, 0x9092, 0x7f}, {0x0, 0x21, 0x0, 0x8000, 0xffff0000, 0xf645}, {0x8, 0x0, 0x3, 0x6, 0x895, 0x5}, {0x0, 0x3, 0x3ff, 0x4d, 0x4, 0x7fffffff}, {0x6, 0xc538, 0x0, 0x4, 0xe, 0x80000000}, {0x7, 0xffff0000, 0x3, 0x7, 0x3, 0x4}, {0x7f, 0x2, 0x8, 0x7ff, 0x6, 0x2}, {0xfffffffe, 0x0, 0x5, 0x54, 0x9, 0x2}, {0x1f, 0xffffffff, 0x1, 0x2, 0xfffffffd, 0x20000000}, {0x9, 0xba3, 0x0, 0x7ff, 0xffff, 0x3}, {0x800, 0x1000, 0x2615, 0x9, 0x7, 0x9}, {0x9, 0x80000001, 0x5, 0x4, 0xfffffffc, 0x1}, {0x8, 0x716d, 0xfffffff9, 0x3f80000, 0x7fffffff}, {0x1f, 0x3ff, 0x1, 0x0, 0x0, 0x1}, {0xa01a, 0x0, 0xffffffff, 0x2, 0xfcda, 0x81}, {0xfffffff7, 0x5, 0x7, 0x7, 0x6, 0x8}, {0x6, 0x2, 0x400, 0x7, 0x1, 0x6}, {0x4, 0xdbc, 0x3, 0x0, 0x9, 0x4}, {0x1000, 0x72, 0x4d, 0x1, 0xffff, 0x9}, {0x7fffffff, 0x3, 0x3, 0x9bea, 0x8, 0x9d5}, {0xfffffffe, 0x0, 0x4, 0x7, 0x7, 0x8000}, {0x3, 0x751, 0x1, 0xffffffc1, 0xfffffffa, 0xffff8000}], [{0x2}, {0x5}, {0x4}, {0x3, 0x1}, {0x2, 0x1}, {0x3}, {0x1cf993e48f9a8f17, 0x1}, {0x1}, {0x5}, {}, {0x3, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x5}, {0x3, 0x1}, {0x3}, {0x1}, {0x1}, {0x5}, {0x1, 0x1}, {}, {0x4}, {0x3}, {0x4, 0x1}, {0x5, 0x1}, {0x3}, {0x4, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x4}, {0x3, 0x1}, {0x3}, {0x2, 0x1}, {0x4}, {0x5}, {0x1}, {0x4}, {}, {0x3, 0x1}, {0x253862830f3f4396, 0x1}, {0x5}, {0x3, 0x1}, {0x2}, {0x2}, {0x4, 0x1}, {0x5, 0x1}, {}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x5}, {0x0, 0x1}, {0x4, 0x1}, {0x1}, {0x7, 0x1}, {0x5}, {0x2}, {0x1}, {0x4}, {0x0, 0x1}, {0x2}, {}, {0x4}, {0x2, 0x1}, {0x0, 0x1}, {0x1}, {0x5, 0x1}, {0x3}, {0x3}, {0x3}, {0x5, 0x3}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x3}, {}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3}, {0x3, 0x1}, {}, {0x3, 0x2}, {0x4}, {0x2}, {0x2}, {0x0, 0x1}, {0x2}, {0x4}, {}, {0x3}, {0x5}, {0x2}, {0x1, 0x1}, {0x4}, {0x3}, {0x4}, {0x1, 0x1}, {0x1}, {0x5}, {0x0, 0x1}, {}, {0xd36b42e976e495cb, 0x1}, {0x2}, {0x2}, {0x4, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x5}, {0x4, 0x1}, {0x2, 0x9b5bcbc0a0bf2dea}, {0x5}, {0x3}, {0x0, 0x1}, {0x1, 0x1}], 0x1}}, @TCA_PEDIT_PARMS={0xe98, 0x2, {{{0xffffff81, 0xf7b, 0x6, 0x3000, 0xffffffff}, 0x3, 0x0, [{0x8, 0xffff, 0x7, 0xe5, 0x400, 0x7}, {0x4, 0x8, 0x3ff, 0x7fffffff, 0x2156, 0x9}, {0x0, 0xffff, 0x2, 0x1, 0x8, 0x245}, {0x8, 0x3, 0xfffffffe, 0x9a3, 0x8, 0x54}, {0x1ff, 0x9, 0x5, 0xfff, 0x800000, 0x4}]}, [{0x8, 0x5, 0x3, 0x0, 0x3, 0x1}, {0x80000000, 0x1, 0x2073, 0x5, 0x6, 0x5}, {0x1, 0x7, 0x5, 0x19d, 0x74d, 0x6}, {0x3ff, 0x0, 0x0, 0x9, 0xee8, 0xfc000000}, {0x0, 0x7, 0x401, 0x6, 0x9, 0x1000}, {0x9, 0x6, 0x1, 0x7, 0x0, 0x2}, {0xfffffffe, 0x4, 0x7f, 0x2, 0xfffeffff, 0x4}, {0x0, 0x1, 0xc49, 0x7f, 0x940, 0x1}, {0x0, 0x100, 0x6, 0x1, 0xb, 0x7}, {0xce22f17, 0x3f, 0x6, 0x2, 0x1, 0x7fff}, {0x0, 0x1, 0x1000, 0x7fffffff, 0x2, 0x9}, {0x7, 0x6, 0x0, 0x0, 0x7, 0x9}, {0xf8, 0x8b0, 0x3ff, 0x6, 0x4, 0xffffffff}, {0x4, 0x0, 0x8, 0xc6, 0x10000, 0x5}, {0x0, 0x284, 0x7, 0x8001, 0x3ff}, {0x5, 0x7, 0x2, 0x8, 0x3f, 0x7ff}, {0x7ff, 0x0, 0x78fb, 0x0, 0x6, 0x4}, {0x3, 0x8, 0x6, 0x1000, 0x1e, 0x8}, {0x4, 0x1, 0xfffffff8, 0x200, 0x5b, 0x9}, {0xffffffff, 0x40, 0x4, 0x5}, {0x10, 0x6, 0xf, 0x1a1a, 0x7ff}, {0x7fffffff, 0x2, 0x3, 0x80000001, 0x378d, 0x45}, {0xfb, 0xff, 0xa20, 0x8, 0x4, 0x3}, {0x5, 0x6, 0x6, 0x6, 0x5}, {0x5, 0x400, 0x401, 0x1, 0x20, 0x200}, {0x9d, 0x1, 0x40, 0x1ff, 0x1, 0x1}, {0x4, 0x1, 0xef68, 0x3, 0x4, 0x20}, {0x1, 0x0, 0x101, 0x0, 0xf6, 0x3000}, {0x3f, 0xbd62, 0x0, 0x2, 0x7, 0x5b2}, {0x720, 0x6, 0x2, 0x3ff, 0x7, 0x2}, {0x0, 0x6, 0xffffffe1, 0x9, 0x1, 0x5}, {0x0, 0xbc, 0x80000000, 0x69, 0x9f9, 0x7f}, {0x83, 0xdf12, 0x4b0, 0x6, 0x2, 0x8}, {0x4, 0x7, 0xc1165346, 0xffffff7f, 0x5, 0x5}, {0x7f, 0xfffffffa, 0x1, 0x7, 0xc119}, {0x9d, 0x9, 0x48, 0x0, 0x1000, 0x3}, {0xffffffff, 0x50e0, 0x0, 0x1f, 0x10000, 0x5}, {0x1, 0x4, 0x4fe2, 0x8000, 0xffffffff, 0x7}, {0x4, 0x1, 0x3bc, 0x1, 0x1f, 0x5}, {0x0, 0x1000, 0x8, 0x10000, 0x800, 0x4}, {0x200, 0x10001, 0x6, 0x8, 0xee4, 0xffffff47}, {0x4, 0x100, 0x5, 0x4, 0x401, 0x6}, {0x4, 0x400, 0xee28, 0x10000, 0x1, 0x1ff}, {0x6, 0x8, 0x2, 0x2, 0x2, 0x80000001}, {0x3ff, 0x4996, 0x0, 0x7, 0x4, 0x8000}, {0x0, 0x8, 0x6, 0x7f, 0x9e6, 0x6}, {0x637f9b35, 0x80, 0x3, 0x1b00000, 0x7, 0x4}, {0x1, 0x70b8256e, 0xe0, 0x200, 0x7, 0x4}, {0x7, 0x0, 0x5, 0xb, 0xf00d, 0x8}, {0x0, 0x1, 0xffff, 0x8, 0x200, 0x10000}, {0x7fff, 0x3, 0x5, 0x78, 0x10001, 0x8}, {0x81, 0x9, 0x5, 0x154, 0x8, 0x7fff}, {0x1c00, 0xf3, 0x6, 0x97, 0xe4d, 0x5}, {0x200, 0x7, 0x7, 0xac, 0x8, 0xf30}, {0x9, 0xcc55, 0x7, 0x40, 0xf13e}, {0x5, 0x46, 0x100, 0x3ff, 0x3f, 0x2}, {0x8, 0xa13, 0x400, 0x5, 0x1ff, 0x2}, {0x9, 0x9d8, 0xb9c8, 0x8001, 0x4, 0x10001}, {0x25b, 0x100, 0x400, 0x1f, 0x3, 0xf9}, {0x9, 0x3f, 0x8, 0x6, 0x10000, 0x5}, {0x81, 0x1, 0x400, 0x5, 0x124, 0x9}, {0x6, 0x7fff, 0x20, 0x1f, 0x8, 0x8}, {0x0, 0xfffffb69, 0x7fffffff, 0x5, 0xd2c, 0x9}, {0x7ff, 0x1, 0xbfe4, 0x26, 0x466, 0x9}, {0x200, 0x8001, 0x8, 0xf3d2, 0x5, 0x3f}, {0x8, 0x0, 0x4, 0x401, 0x1ff, 0x735}, {0x1800000, 0x1, 0xd87, 0x7ff, 0x9, 0xefe}, {0x80000000, 0x1, 0x100, 0xfffffff8, 0x7a, 0x930}, {0x9, 0x7fffffff, 0x5, 0x81, 0x1000, 0x7fff}, {0x9a9, 0xff, 0x8, 0x0, 0x5, 0x1}, {0x0, 0x2, 0xac1d, 0x8, 0x800, 0x4}, {0x7, 0x101, 0x61c, 0x401, 0x80000000, 0x3}, {0x401, 0x80, 0x7, 0x1, 0x7, 0x4}, {0x7f, 0x1000, 0x9, 0x3, 0x4bd, 0x5}, {0x30f7fff4, 0x7, 0x9, 0x6c65, 0x1, 0xc7a}, {0x8, 0x554, 0x3f, 0x4c, 0x100, 0x6}, {0xc75, 0x1, 0x7f, 0x0, 0x5, 0x4}, {0x1, 0x9, 0xffff, 0x6, 0x0, 0x7}, {0x9, 0x0, 0x4, 0x7ff, 0x9}, {0x7, 0xffffff7f, 0x4, 0x1f49, 0x3, 0x9}, {0x2, 0x1, 0x3, 0x6, 0x7, 0xf1a4}, {0x7f, 0xfff, 0x9, 0xd1e}, {0x80000000, 0x401, 0xff, 0x4, 0x0, 0x9}, {0x1, 0x1ff, 0x1ff, 0x2, 0x9, 0x4}, {0x222c, 0x2, 0xffff, 0x401, 0x2, 0xfffffbff}, {0x3, 0x10001, 0x3ff, 0x4, 0x401, 0x3}, {0xfffffffa, 0x2, 0x3, 0x2, 0x200, 0x79}, {0x8001, 0x200, 0x7ff, 0x3ff, 0xff, 0x8}, {0x1, 0x3, 0x5, 0x5, 0xfffffff7, 0x1ff}, {0x9, 0x0, 0x10000, 0x0, 0x0, 0x1}, {0x2, 0x3ff, 0x0, 0x2041c71f, 0x8, 0x4}, {0x3, 0x6, 0x2, 0x5c, 0x8, 0x6}, {0x3, 0x9d, 0x2, 0x6, 0x3, 0x2}, {0x8, 0xbc3, 0x4, 0xcc, 0x4, 0x6}, {0xff, 0x3f0, 0x9, 0x5, 0x0, 0x2}, {0xa7d, 0x1, 0x0, 0x5, 0xaa94, 0x26}, {0x80000001, 0x7f, 0x5, 0x1, 0x2, 0x8}, {0x1, 0x4, 0x9, 0xffc, 0x8, 0x4}, {0x8, 0xfffffff9, 0x81, 0xca6b, 0x3, 0x3ff}, {0x3, 0xfffffff7, 0x2, 0x2, 0x0, 0x1}, {0xbb46, 0x8000, 0x6, 0x100, 0x3, 0x1f}, {0x0, 0x800, 0x10001, 0x4, 0x7fffffff, 0x47}, {0xa19, 0x80, 0x4, 0x0, 0x5c}, {0x8b4e, 0x81, 0x3f, 0xf38a, 0xfffff1a9, 0x6}, {0x56, 0x909f, 0x8a18, 0x0, 0x400, 0x8001}, {0x0, 0x6, 0x200, 0x8, 0x1, 0x3}, {0xb1, 0x80, 0x7fffffff, 0x2, 0x3}, {0x2, 0x994, 0x7ff, 0xfffffff9, 0x1000, 0x401}, {0x1, 0x6, 0x3f, 0x10000, 0x7f, 0x3}, {0x3, 0x9ca3, 0xffffffff, 0x22d, 0x7}, {0x3f, 0x7, 0x7b6, 0x4d6, 0x20, 0x6}, {0x3, 0x61e55241, 0x1, 0x1, 0x50000000, 0x8001}, {0x6cb6, 0x4, 0x1, 0xb9, 0x5, 0xfff}, {0x4, 0x0, 0x1ff, 0x2, 0x101, 0xf3}, {0xfff, 0xdc7, 0x0, 0x9, 0x2, 0x12b}, {0x1f, 0x35bc969f, 0x1, 0x7, 0xffffffff, 0x7fff}, {0x1, 0xffff, 0x6, 0xfffffff9, 0x20, 0x7}, {0xa1d, 0xffe000, 0xfffffe01, 0x7f, 0x7, 0x2ca1d328}, {0x100, 0x6, 0x0, 0xffff0eaf, 0x2093, 0x401}, {0x5, 0x0, 0x2, 0xfffffff8, 0x1, 0xac}, {0x3, 0xfffff1d3, 0x252, 0xc6, 0x8, 0x6}, {0x8, 0x2, 0x6}, {0x0, 0x5e2e7ea2, 0x7, 0x2, 0xfffffffc, 0x8001}, {0x1, 0x1, 0x15, 0x90b3, 0x4, 0x7}, {0xec, 0x0, 0x7, 0xfffffffe, 0x9, 0x8}, {0x8, 0x80, 0x1f, 0x400, 0x80000001, 0x7fffffff}, {0x6, 0x7ff, 0x15, 0x80000000, 0x2}, {0xea, 0x433b, 0xbc0, 0x4, 0xf9c, 0x3}], [{0x5, 0x1}, {0x3}, {0x3, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {}, {0x5}, {0x4}, {0x4, 0x1}, {0x3, 0x1}, {0x4}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x1f28de96648bb40b}, {0x5, 0x1}, {0x2, 0x1}, {0x5}, {0x2}, {0x5}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x2}, {0x3, 0x1}, {0x1, 0x1}, {0x3}, {0x4, 0x1}, {0x0, 0x1}, {0x5}, {0x0, 0x1}, {0x2, 0x1}, {0x5}, {0x2, 0x1}, {}, {0x3}, {0x3}, {0x2}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x5}, {0x0, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x1, 0x1}, {0x1, 0x1}, {}, {0x3, 0x1}, {0x2}, {0x5}, {}, {0x5}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x2}, {0x4}, {0x1}, {0xe}, {0x4}, {}, {0x3}, {0x3}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x2}, {0x1, 0x1}, {0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x2}, {0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x7}, {0x2}, {}, {0x3}, {0x4}, {0x5}, {0x2}, {0x1, 0x1}, {0x2}, {0x4}, {0x3, 0x1}, {0x1}, {0x1, 0x1}, {0x2}, {0x3}, {}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x4}, {0x1, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2}, {0x1}, {}, {0x5, 0x1}, {0x1}, {0x5}, {0x4}, {0x4, 0x1}, {0x3, 0x1}, {0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x5}, {0x5, 0x1}, {0x1}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x5, 0x1}]}}]}, {0xe4, 0x6, "fcd379f51b5e298d05644404d0b38b2e58e746f9e627cafd38650085ff8561bb83555f2dc7ad37cf5cd3267da0deaeb696ef8921a22f962f0715f0117a3365f4a7edb311beeef4b6ba3499b936cb5ca92237aff7039fb58c0807e77dae1538bd26c23e722aa34afa75e862e5fb33708ea135ea04a3f2831bee79723dc483bfca630ee52dba10c006685572ff37c9fb23cf1df4e0875370de5649d8ab9c4aa1bb9b97e6b76fe4c290c0fb3d6802759915815025535c650f7928cba24178b7f1441f76e43869f942c10d6c22bebd17ddd1a0badb9cbadb4d1cd52eaf4ffc562234"}}}]}, {0x284, 0x1, [@m_skbedit={0x8c, 0x2, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x8, 0x7, 0x8, 0x7fff, 0x40}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xfff3, 0x9}}]}, {0x57, 0x6, "042c30564a25a239fd19ba45d207403479f8ecac3116afd6546fba8ab3d95c61188bd762b967f0fbdaf22ab8e4e68c31a492d021354128c9561f5d1f7579e32806262e1b2ab6c63c871d99f7b27961348dbe7d"}}}, @m_nat={0x17c, 0x12, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0xa4, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0xfffffff8, 0x10000000, 0x7fff, 0x8}, @local, @remote, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x2, 0x1, 0x3, 0x0, 0x101}, @remote, @dev={0xac, 0x14, 0x14, 0x12}, 0xffffff00}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0xfff, 0x1, 0x800, 0x34f75079}, @dev={0xac, 0x14, 0x14, 0x33}, @broadcast, 0xffffff00}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xffff, 0xdcd0, 0x5, 0x3, 0xfffffffc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, 0xffffff00, 0x1}}]}, {0xcc, 0x6, "330e40f93d5eeb04cd7e17917d013f362f899771bb8a8bd9c9085d0b2502bb1fe31efadb9fab5b865ce3d7ee96985a431797902817cb7d479fcf8db10adaaf537ca050b0cef5e3ff9ea72a71baad973b58e30866113a8c894f98a91c7d4f682d42accd6443f6b50305252d2d623c6407286f15ce7c3f9a46c523113be1de1b85399dae62debccf5071232c5e212796899dc2a063ee77d52eeed75e149cc2041b6707bf2cf569b2a545a69660913fcb1df15920e5eb025a76d2bd721e16fb307f9a9f9722f0a59e14"}}}, @m_vlan={0x78, 0x8, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x64, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x2, 0xd238, 0xffffffffffffffff, 0x0, 0x42}, 0x3}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x4f}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x19c}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x1, 0x6, 0x3, 0x401, 0x8}, 0x1}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x78e}]}, {0x4}}}]}, {0xb4, 0x1, [@m_mpls={0xb0, 0x11, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x3, 0x8000, 0x2, 0xfff, 0x3a}, 0x4}}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_LABEL={0x8, 0x5, 0x67b68}, @TCA_MPLS_LABEL={0x8, 0x5, 0xe0029}, @TCA_MPLS_LABEL={0x8, 0x5, 0xad09b}]}, {0x5f, 0x6, "e90631cd22743cbbb10e5cd95521caba995ef00e4d29438e67319f8199fff2b5001b1a496f41b286d0d5c14d9f460649e478851bfe47cc41cfd424edc7357b8b5318bde1e70b5c7a481613298b798e0b2874fef7a70101930bcdea"}}}]}, {0x58, 0x1, [@m_connmark={0x54, 0xc, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5, 0x5a25, 0x5, 0x80000001, 0x200}, 0x5}}]}, {0x20, 0x6, "9ce5752ebc90a59d972fa1c7f080b405aa83020ec4edf34acae815d9"}}}]}]}, 0x4610}, 0x1, 0x0, 0x0, 0x4090}, 0x4810) 11:39:33 executing program 5: r0 = socket(0x18, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r5, 0x0, 0x1002) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000380)={0xa30000, 0x9, 0x400, r6, 0x0, &(0x7f00000000c0)={0x9909e5, 0x1, [], @p_u16=&(0x7f0000000080)=0x8}}) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400011e00000000", @ANYRES32=0x0, @ANYBLOB="005042488c23492881ad93efde8b98bd459e7e3a44"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r8, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r8, @ANYBLOB="00000000000000000400000009000100727376700000000014feff00"], 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 11:39:33 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$VIDIOC_G_OUTPUT(0xffffffffffffffff, 0x8004562e, &(0x7f00000003c0)) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x1470c2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46000) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x10a00, 0x0) io_submit(r4, 0x3, &(0x7f0000000300)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0xfffd, r3}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0xeee, r3, &(0x7f0000000100)="55c12143af5a02aa17bec8c963e5bbef975669994f5ecf89c0ae22d111361fea9d83cb54eeda3c852bc5044d079e0d93080ad03ca3629cdde02f7b8c61f82f7e0d474bbaee98fb5b5897711a29bc500e1111bbe4ac4ec8d217ff4fbe6a8e16b1d0dea2ac68cdac21275e086790a4ed2e4b2e7a6fc47b4fd5f7c1ba315080bf25fd81fe65", 0x84, 0x3f, 0x0, 0x6, r5}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x7, r5, &(0x7f0000000580)="af5b7c09583304ccc80ec31d487e8485a08812b01527ef7c232458ddee1ab85d8c21ebbbb3b93c3069327aa4370777473b528314e1cd2ab0eb9edc8274a96ed56aee62acbdc059c89787f90c739409c12d6ed8ed9b4d31646ef62858db3f3e2c0d0e3ccf990add552df7f65f42a61a839e9462c9e518ae0401626727d5bea2b74a9a1350a8f3169253186f77fc52765258b9b76f41ac68f2c4bca252b0ab5ecc54b1a5229495939e8b604fec04f58bb2f9f80c663e8df86f53e116eba1fef9186bc54a8c590cfdd1c7156f0ab7ea4a55e007c83d52a1d9c5cd2cc98529b147fad3dfdde600ca8835f11f086397a322321ffb7f20ffac45a00f6123187e8733259c4704e763846f896e175c41945a209f9f3e3e32ed54bfbbea359729054166e194bfd919fa10443910d562f5241cdc8cf83b42f2ca149af93e7ac4b4122378e5772898224b2bc12a8ef1baf063f13d016c7d7816ef0732e4d7fb6bc46e964dfebf46924a44ee1bf7e0b56e9ae34506e149d284472abeb466538e485e3c073fc171f42ae0093df7e3fa33f632fcc751e79172829f9e434f60c5c0ff2f9d901ffaa819dafa1e9cae130983856bb596664e64ab1a3e72f3651d5e3a8220fd3b15754f7dc3605518ca7e9b18e664f3400b8c2075968730bba9dab2f790fb6caf1ac9622853832beb9c351d649ee4afe502550ce49ac2934e925a4df16fc7ce25b9d403fe9d2c89cc5966c86d698aa923746270cbc174abded345802fd28e921519459d213ca37eea14a981f3c737ae0db6c85df262f956db72479c68ef4211e9104d91e02ad7fd624b1d30a91b13eb4e87169bd63d2ed2019cff3f0e558af1ff59ec5de986d14af4d3fbf39a19b443f31bee86d1f7a871346a3e1c38935cb49ca29302348d370066ef1d98ce337f66b34f7b13f5080cad34eee282d7b56adb6b9dbcd5f31e405ff80ce6e8becd73c4a7524c68800676484f001d0a32db60aaf4c2745da17ab348504892145499c5c718bfb309b246a879031dcce0033fbc2395f7562634c53f7b464dfcf3216e8d4ee20272821a97942f94dd61f1bfb74e900db25607b2072f5826ed1ebb9ddd73bd59d7b3cc0f64dbba813cac48df580b88a23bdf28ba571b80a8b09b5aef3a8979dd6af94c665f8e4558afe2d64b79f1e9f60889a73ad962c3df116366a5cc86e6341b304911012a8443025b7f53c29a9a1f73245da0bea1b2418a0a179c50e9e4119ff82a9b1c742509afbe308ac41ef6aad4b0ad5febf1b9b66e7a147e2db87991289acf4527574b9a602d975d8345a3de98c7a3ac1853386e5f7cd33dc7195c186c0a394e0a0e4792dde4e154833b0911a51193fbcb4b646347e1d378ccbfa5b1d60b46e1e8a572fcb69c215cb3d6cd07d931a7349350e670e717ffd6353c83747d89c8a9d46482caa713bdf3510b1e6dddaa8c5d14b630dda8e7e4762a6de5f75b160121f07a22bd434b583dbddbafd2cf27309070b9f484ffd7c52e444b4b942e5c55be4287d729836392ebeba63893a6cd22a0e98a7ae18dcd47742f28d7eb4c146e42fd6cb156395e55d56c9aaba0081e2fe63e8af6dea9cbc9e8dd6bbd0f82e3ef1f14698086860a3ae92ae2fefd573c19673f9b5f3ab330b1f8c2732bac7232a3105942cc2bfd0ae303c13fa18adeba7bfa1c24b997b890d7b3706f932af5349de0daea54d46e9e8b29c7b918b505caf4c01f54021b8dd07efa09c62e25ff2ce38aa43d7fcea1631a66d5815c4745d840d318e80b621a4f6b54dc19891c82ed26af404084d5536aefb54010a72131527ce7e9335c8fb08fd28a6615b370ba462b93d35d0531fbb219c0d7d562a86bb8b77cd539ca6b5057a0f20385f36e86d9da7739e9bd1250dfda04ea67e143ea55911afdbdce25267684007839893b0629e7b935181f57427f8dfec3bf35894153c6767256929e74f4fb33492af48353d52e94c2f80c338af2aa22f4660df9eeaa9e473b95123021e0fa7572a3c069f7a4a278f684f30f1d897b2be9ab693436196c7d721d21dd8f64afaf89a773bdbb27cb7c24a067bcf337e39a4d0b8e074e53d55c818d2bdfdf853adb12abcbb8ae30651035455eb2d9be5b4318ff7003d6ad8cce7b5df3ed49b5e1471e4f1385e2141e672b64836b90b2acee997ff722e325993e0379afe35227a7b6cf9d29142b6ba186f531c63a7391e455c5702759824d41f6de38c04d13ce2be6807c8738b3b19aa0214736810871b454c8d08ccd9f2d0e6dc71f5aa42950b60f416edb5ecdb3fe657e80877638e369d60c97a666e69386fc6f66f6c73f27f6b86ca8b691a04375b7f19513d5eacc32b90ef8fcc4aa84659e4eb77d0c0a4f21ee6e40fa3c564368e0ce12bf9693b3cbe61bab37673619448b03706681dc64fdab53c196b549a55c6ae924735b3ce4391c4a35477cdcea0e09071b7e1187bc20c1060b1b10ea3e72eac60113b2ea1a6e65be11a822f4c897a5ab947f11e38bb61db644ace2357abde5104888f1f82cb8a387bfd9f23f5d0e3a8ce4fc3bfc68651d5d2daaed5781067429574d1e82dd506e6fe7522ede1f2bc1dbf84c540af28bed1cf496278566d7e5345e0761b02d340068dcc4cc11f485b2882da950d173c5906e52ed0ebac6dd4fae4bf5ae0e1906f720e88f0db1499ae899db0f37050b6dd0ecbf0760ad11265a597598f17a58e8cd8dce51224a58bf4af0bc00642d8bbf353f0267829d85fb9e880bc9ceece4540c554f84e491e75e669e9d37e60c18b44420a5e63e901dd379a423c8a8006a63c16b894bd809101ccec07cc2e850381883463fb89b520a7ed102144e090432de142714040abb8985ad80d8323492e48fe1097f7ba0c697418d2a9fa49c9a5fb6a0c82078e3fca2f7300232251855a8dc424afa7c941a0ada32dbf3a1ef73e002b329ec34f9402cdd880154362da3bdb963193ba0015e442f610639aa25126535a4ed8df76dd411355343274b5017927452507b61a6e02f5cb0170c9939037d625f106674d0345405e0c85d2f47d6b5d0d59449fdbb7853d08f19601583c9e961334113188aaeee08049319c3abbfa53f6849140704d3e4f8e192273d09d5e1df8705cbcf07b0abf2c2bee3b0f31fa2f4957b31ae5198904ddde7261370c976eec0dcc60ccdd1171a43e09aeb07cff722cf6a221beb1b7ec70d63d452adb582f2267c4303631fb7a9cc887f20585925214c5522505a4e246954c03f6ec6e85ecbab8c41e6b1ba0b2344fe90208101980a09625ed5c288590de154768d62fd8fc427779277587e2814e24d5a0528ac93a109bf44fd1f37b217a3891406214712237875c25d94c9f6e9dbf6864a8eb0c982ece999702de892f7459bcc18447dd036fc12296da104ee6ae894134895a2699bbf8cbb53cb523bc82e38167bb22527233fbde777dbdaa414ab8865b4207555d77e28d73a9ef085d43c629a7b73d8f4a6a8450ee018f95897810e3b780f7c9b724dd9f2da8acd8dfba00eb491be0c2599147e0a3e609b3278e7b8f75d197b3746da80e427b9def77173b9788b6560b8c4b09ebb446644dbc8b8c964387f3874b83129e3c6a0e81a5631d8524e0c3dae32769cd907e242ac8b08f2f7257bde9ca3eb50727f76cf8e85c768c63821eb65597593ad37ded2a427cd5e175edd9a15120b662f2dc963fdfa16f69c64095b8aa8c91dc34eb8a8bd60977cbc499905d7f32cf7f062242b0a83147b9a23e5ed676a4b0c617c6dcfe0c2fa78c1e46dec5a1280f78ebd87acdf2145db3503bb75a41dc5acc1b493f830c3c9836f431f70df8a3d7b5de8d6200a051be4338bc685abf9c40b1f450fb025d91764aeea93064d46f624a6b5c1485508af8ea7757b8ddefa82b44ec30fdfd36dc3fe3dfb6774dcfb2e5e7bc5b7b36bc29147ce7a2703dc6b87ee996ed5a7e7fc048d7c234b0aa0200ec5a5c0174a3dbc5adf076d0e6117fcbefdf8eb764cdadc151488456daf3244ada84b2b9f729089722e0568eff1cd5d7fb25c40518de9d1656153ce08180d35c397ae99525c99b28ba2b0c4135f8c3c8e4e69924c810cca839616f4be2e7cd7fdec6e1e9ddd121220d7eb8231f8d1827f6edda21c2f4f4f82a49c1b257df770ccaae12305c6ddc117700524e1fdb18189136ee73cb0c0c26fa0e05eaf4f17aedc09aae0ec460fd34dde8a908b31935700ffd8f2b2cc0ae6fba22fc13c8f0897e25d7c4d2da2a76b74e47cf268633c49591f9148bab0b23d9dc2d63c18e5289e863d071a164aa801a6d97af0218f981cb915d557a05bc8164af7fbeef07cda5b935f28375f5b7c245e9e08f0fb3fb148651ca6beb970e2becb965717e9a9d365d5b1d783b803477beac9a64652934847c2b8e7acc6d1ea78426a8c1fe32737a8dd64da161e49ff5d8bddedb82ec0ddbed37edb14dd2e25517cf0da30fc8818be6572140a7a67d73da2d5e423326c61f374d7f3506149681a0418fd6660ce9bbcd2f2ed5471abb516b749ddbe068ad76d0479e1c0f5aaeeaa202ecfe2bef70fbce8b840384a3aaad7b80b04eaba3af7e1cca0586388a9a6a750092823966224c04ff061fd1ebc501e6196c614aea3fa53a344dae91d0d64a1e336c8eadfc275bd40e7dd19f499d1f819d3c692b2bd02ee4b48f29a12460d7284151d99600019d59716fdab78aa60e4fa7d83c2749b769e66b3a438e8843594880c899cf74886a76c0cd167060f79914d720cd3a4c8a356192474e6638b710b7928c50ebb2f8e76a53e7d9e5f32937cbf11e4b322c092bf9677d2b0be064504ea080039c3cee1ec83793ef35f1beb7f31845de9921384d6bb5e5d8b565543ec512a1a52d264b00e9bc00292c3f2d3db490980ed582e2b1b6f2f323fe15b7c1a780b17e6d614bf9b04b312341d8f5c7a4dd0f2e2424b339e0b514b8db956042d6ecf00c2193612f4cd3bbff5409bbcc77f3b8b5a1c67e5a42e2c937e2d6d0cd2c3feb2eb92a614c6fd8568dfb0facf7c12e95aaae89043ffd0afcf1acab45b4098fa3275e1c96bdef7f528dee0221a5a500ea5a9cbf4571ad47009af7882915c86293ec0527d3258fbe300d2da8ff0aa7805fff1ff3391dfc7fe558c17b84c175423af24b8cd662a94203e8b310b8d17e5f319e69d534b478c7a961ef92848dd74bb00d530fc1b261ebfaf310c3a2aa3a3f3f8fc78741647092938f86442d9b616899b479265795a8792e2168e9ed02eb5f8716de51bab73c6836cc964ae6a1645d52964148fd6097f49455188e1b908f866c345a6b4d2931ae0c7f06243e1d86a2801ee6a5a099910205bc5f49094a70353f3322f7a2987ccc08c203fa8b6c0e07ca2ec28b723b8971c800529e284c31ba0bcb9756913183fdf465e899ea5efaae1cb19a1f74d2bb811e71a55758c144c9de4ecb0d8ab377e5058b18887ca6a6378323b0cf0b4a70b366e276cc8a0f2f34c3eec634cd1d69dd6cc1edf3f31d3e040f0deb375f1d2c7a5184925e8b066ea1ab661e1babbb17286bb50d13f7d122d038d7ae6b628e35e89260ec95a0d435bf87d7471a69a82d9c3f897b641ceb3b02c90ef44ff1c8354db903e07ddd32729235c3f0f35bc927efc7945a200aa49577b062c9c749251b24421ccfbf82a2a272a894b25a74f6d8052f90357cde5a410f89f871388a0550c59d3270b4ec3135dc7119302ef31c5f76dabb21a387de6d11da5c697e088c547cf534f131383ffca6169fa1a54d393e7c95b6260a6fdfccf328693cd340418cb521364ede618f2c09dc40e65d596587d039ea07059a3", 0x1000, 0xbee, 0x0, 0x2}]) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r7, 0x0, 0x1002) accept4$phonet_pipe(r7, &(0x7f0000000340), &(0x7f0000000380)=0x10, 0x80000) sendfile(r2, r6, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) [ 231.339250][ T8984] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 231.362064][ T8984] FAT-fs (loop1): Filesystem has been set read-only 11:39:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r5 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r7 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r7, 0x8200) ftruncate(r6, 0x0) [ 231.572564][ T27] audit: type=1800 audit(1587641973.713:5): pid=9005 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15854 res=0 11:39:33 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r5, 0x44b6f2ca51787dc7, 0x0, 0x0, {{}, {}, {0xc}}}, 0x30}}, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r9 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r9, 0x8200) ftruncate(r8, 0x0) [ 231.734617][ T27] audit: type=1804 audit(1587641973.743:6): pid=9005 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir561736991/syzkaller.XtigWg/7/bus" dev="sda1" ino=15854 res=1 [ 231.801020][ T27] audit: type=1804 audit(1587641973.743:7): pid=9005 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir561736991/syzkaller.XtigWg/7/bus" dev="sda1" ino=15854 res=1 11:39:34 executing program 0: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="7000000000011905030000000000000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e000010208000200ff00000008000700000000000c000d00080001007f0000019e58e0c4e489c3c21af10959a3d6a4c348e7ed141eb90b40b5ba80c6a970148dfb92ca5fe79e7fe5802250b08ab30f739390b08b7bbdc9f44112046295fca62abc7231863f4e10bf1390"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000000000000000000000000a20000000000a01000000000087a3db98000000000900010073797a300000000084000000080a8381933a000000000000000000000900010073797a30000000000c00024000000000000000032e000240"], 0x1}}, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x200010, 0x4) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000001) [ 232.036745][ T27] audit: type=1804 audit(1587641974.173:8): pid=9024 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir582001587/syzkaller.sweB2R/14/cgroup.controllers" dev="sda1" ino=15858 res=1 [ 232.068921][ T9024] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.0'. 11:39:34 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:34 executing program 5: r0 = socket(0x18, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r5, 0x0, 0x1002) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000380)={0xa30000, 0x9, 0x400, r6, 0x0, &(0x7f00000000c0)={0x9909e5, 0x1, [], @p_u16=&(0x7f0000000080)=0x8}}) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400011e00000000", @ANYRES32=0x0, @ANYBLOB="005042488c23492881ad93efde8b98bd459e7e3a44"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r8, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r8, @ANYBLOB="00000000000000000400000009000100727376700000000014feff00"], 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 11:39:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r5 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r7 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r7, 0x8200) ftruncate(r6, 0x0) 11:39:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x3, 0x0, 0x2, 0x0, 0x0, 0x10000003c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0xa08, 0x0, 0x0, 0x0, 0x0, 0xc2a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x32}}, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7240}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 11:39:34 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 232.601548][ T9044] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 232.659232][ T9044] FAT-fs (loop1): Filesystem has been set read-only [ 232.782102][ T27] audit: type=1804 audit(1587641974.923:9): pid=9027 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir582001587/syzkaller.sweB2R/14/cgroup.controllers" dev="sda1" ino=15858 res=1 11:39:35 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xf595, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000100)={0x0, 0x0, 0x0, [], 0x0}) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f00000002c0)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x1405, 0x2, 0x70bd25, 0x25dfdbff, "", [{{0x8}, {0x8, 0x3, 0x4}}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000c4}, 0x2600c045) pipe(0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)=0x8001) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:39:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r5 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r7 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r7, 0x8200) ftruncate(r6, 0x0) 11:39:35 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:35 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffffba, &(0x7f0000000340), 0x0, 0x0, 0x6686}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup3(r2, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) ioctl$TIOCSCTTY(r3, 0x540e, 0x1) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000100), 0x4) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') 11:39:35 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/66, 0x42}, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffffffffffff, 0x48000) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000100)=""/230, &(0x7f0000000040)=0xe6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r5, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000200)={0x6, 0x118, 0xfa00, {{0xe60, 0x8, "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", 0x80, 0x2, 0xf6, 0x8, 0x6, 0x1, 0x22}, r5}}, 0x120) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x9000) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000080)) 11:39:35 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0xa080, 0x0) ioctl$SNDCTL_DSP_SETDUPLEX(r1, 0x5016, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = inotify_init1(0x80000) fcntl$setown(r3, 0x8, 0xffffffffffffffff) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r4, 0x0, 0x1002) ioctl$RNDCLEARPOOL(r4, 0x5206, &(0x7f0000000000)=0x20) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x39, 0x1000) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/49, 0x7ffff000}], 0x1, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r6, 0x0, 0x1002) ioctl$VIDIOC_SUBSCRIBE_EVENT(r6, 0x4020565a, &(0x7f0000000080)={0x8001002, 0x1}) timerfd_create(0x8, 0x0) [ 233.423436][ T9076] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 233.457291][ T9076] FAT-fs (loop1): Filesystem has been set read-only 11:39:35 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'bond_slave_0\x00', 0x1}) sendfile(r6, r5, 0x0, 0x1002) r7 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x10001, 0x80000) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r8 = dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4138ae84, &(0x7f0000000000)) r9 = fcntl$getown(0xffffffffffffffff, 0x9) r10 = gettid() setpgid(r9, r10) dup2(r8, r4) 11:39:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r5 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r7 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r7, 0x8200) ftruncate(r6, 0x0) 11:39:35 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/66, 0x42}, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffffffffffff, 0x48000) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000100)=""/230, &(0x7f0000000040)=0xe6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r5, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000200)={0x6, 0x118, 0xfa00, {{0xe60, 0x8, "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", 0x80, 0x2, 0xf6, 0x8, 0x6, 0x1, 0x22}, r5}}, 0x120) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x9000) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000080)) 11:39:35 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:35 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 233.729369][ T9097] mmap: syz-executor.4 (9097) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 233.776525][ T9109] ptrace attach of "/root/syz-executor.4"[7389] was attempted by "/root/syz-executor.4"[9109] 11:39:36 executing program 0: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="cefaad1b0f02000040989332cd011f9af39a192689eb1d1282b9bdfe7f357a4289771078d9658366412d01d3975940", 0x2f}], 0xd50f, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dri/renderD128\x00', 0x4c080, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f00000002c0)={0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}]}) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) sendfile(r3, r2, 0x0, 0x1002) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f0000000100)={r7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000300)={r7, 0x400}, 0x8) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000180)={0xa30000, 0x9, 0x4, r2, 0x0, &(0x7f0000000140)={0x9e0001, 0xffffd2be, [], @p_u16=&(0x7f00000000c0)=0x7f}}) mq_getsetattr(r8, &(0x7f00000001c0)={0x6, 0x3, 0x6, 0x101}, &(0x7f0000000200)) [ 233.939311][ T9123] ptrace attach of "/root/syz-executor.4"[7389] was attempted by "/root/syz-executor.4"[9123] 11:39:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r5 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r7 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r7, 0x8200) ftruncate(r6, 0x0) 11:39:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0xd000) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r7, 0x0, 0x1002) socket$nl_xfrm(0x10, 0x3, 0x6) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r9, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c000200050007000500000011d9165fe35cf75e5adcafc537684466a96e0a317fc47ff9ed949d8a82743f4012689ebb70da8c5a"], 0x3c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fcntl$F_SET_FILE_RW_HINT(r10, 0x40e, &(0x7f0000000140)=0x5) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_MASTER={0x8, 0xa, r9}]}, 0x28}}, 0x0) 11:39:36 executing program 5: getpid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r1, r2, 0x0) dup2(r0, r3) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x1002) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ocfs2_control\x00', 0x2000, 0x0) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f00000005c0), &(0x7f0000000600)=0x8) sendmsg(r5, &(0x7f0000000540)={&(0x7f0000000000)=@isdn={0x22, 0x1f, 0x0, 0x1, 0x64}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000000c0)="39073376ed8c9a2c3e84dcfe967010827ce544b523226f41ec3f9cd883cca7ea86027fddbc4b7583335d6f2937bf9f8b037ef4b3034501e0ddb3ea097ccd00aedb79004f1e7a5aba9a1a97e6e612b3e8a871b8b21786cfe61135de318c08b45f", 0x60}, {&(0x7f0000000700)="8c094b30a8cfef708a000ff3b74add79b3729a6605bee0548f768f45f0c90c2b8d8ce4dc7954e4d4036675104b4417bcfaa3ed302177a039111e4c5aff8faebf678a2dcc66130c461d", 0x49}, {&(0x7f00000001c0)="c808ba5616d52d700f8ff0c7b65a4e83991cfb9b34af79212ca5cee475012c0a7b10e90aab86a9462756dc2ffdc08013189dcf12a675aa243126a8081fd9368f62da0710616664fcabbe4fd54be7e4f17b30400ff5dc70a55a5f71448a92b509453f71523837cf074fcf2fec8e4407cac00c8527c70e72fc", 0x78}, {&(0x7f0000000240)="c3edadf4f9e0a883303babe8539d6f7af9b77689106bd1f5deb4ae154e6ee5a6e7e570747707c70f39138d635dfcb30a42e17f7056ea163ff9425b9a1f2f6041f11a51098491bb00707a72e298450cad21e1faecefde45456f277871a79710300bc43fafa459705d7f0e1267a40d84f7c3ed95a69e45acd82cda4870519ec0b318e30ce17421f4ced2144dc10ba17ee329b8064b21069dcac0c96d0ad551730f00e44fc9253129af1d3633", 0xab}, {&(0x7f0000000300)="2851d1064cedeecbd44ed386e9aa70f8f81039a372aa87cbb965b9e4ef2fbab68a73183674f3d62d879f10ee6af5105e3b1b728f102d5c5e62ce23f2322b89fe84f6812c947fe60d64bbb8b43bf5f82d896dcd2e313ddf3e3742cc586e799ef2142914dd916c6ecc50346704d4cc0102dc3a047b73ab05ea71d4af9c230f9d74310613c3fc2cd5", 0x87}, {&(0x7f00000003c0)="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", 0xfa}], 0x6}, 0x11) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r7, 0x0, 0x1002) r9 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x10000, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r7, 0x4, &(0x7f0000000640)='ppp1wlan0\'\x00', &(0x7f0000000680)='./file0\x00', r9) [ 234.486137][ T9142] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 234.495836][ T9142] FAT-fs (loop1): Filesystem has been set read-only 11:39:36 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r5 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r7 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r7, 0x8200) ftruncate(r6, 0x0) 11:39:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x25, 0x5, 0x0, &(0x7f0000000000)) 11:39:36 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000001c0)=""/127) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) connect$rxrpc(r2, &(0x7f0000000140)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e24, @rand_addr=0x64010102}}, 0x24) ftruncate(r1, 0x1000) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f00000000c0)={0xfffffffc, 0x0, 0x4, 0x0, 0x0, "24b895715336f06538a41f4abd002288c7b627"}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x1002) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f00000002c0)) lseek(r1, 0x0, 0x2) r6 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r6, 0x0, 0x8000fffffffe) 11:39:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r5 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r7 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r7, 0x8200) ftruncate(r6, 0x0) 11:39:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_DEL_STATION(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_STA_TX_POWER_SETTING={0x5}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x100}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa8, r5, 0x10, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_STA_EXT_CAPABILITY={0x78, 0xac, "cbc9aa6419ff5d3aa2c1b51316b30ec102c636151a7b983ef25a9e13648305a5b8196a068f31c4fdd45e1da26a7782d8b1ec1292060a258687cd7bd43d1d2335f043af6c4ea45cc12ba49321e93795511754a102282a15015dbe784919faa6c4b2b598fa659c65f3ba847eaadda45848404023e5"}, @NL80211_ATTR_MAC={0xa, 0x6, @dev={[], 0x3f}}, @NL80211_ATTR_STA_PLINK_STATE={0x5}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x54c}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000080}, 0x24004000) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x2b}, 0x0, @in=@multicast1, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r6, 0x0, 0x1002) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e23, 0x10, @dev={0xfe, 0x80, [], 0xb}}, 0x19) 11:39:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) socket(0x10, 0x803, 0x0) r2 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000002c0)=0x14) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000300)={0x0, 0x1, 0x6}, 0x10) dup3(r3, r2, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) fsetxattr(r0, &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000001c0)='/dev/nvram\x00', 0xb, 0x2) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) ioctl$VT_RELDISP(r1, 0x5605) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x25}, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x5, 0x85b) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) r7 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r7, 0xc080661a, &(0x7f0000000200)={{0x2, 0x0, @identifier="5fed99d50e2065875d44d176fe2aca0f"}}) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x4001, 0xa000000, @ipv4={[], [], @empty}}, 0x1c) 11:39:37 executing program 5: getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='vlan0\x00', 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x16140, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000340)) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="b2836abd52c2a0b8f328f0c329916615c7d0814babef70f58d50e2a7c8e9c86a8d45f468ea73628c990808c8cfe3a7edaabf84cc1de46f36d831c173a4a20e06ba9d0a2315b1f27e2f0a61f4302ddc960ac2dfe869faffaa9135cef37d824afe160f45f2af87208870", @ANYPTR], 0x87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000140)) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x70}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000c34) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_FWMARK={0x8, 0x12, 0x3e000}]}}]}, 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000640)={0x80, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000005}}], 0x4000000000000d0, 0x0) [ 235.349918][ T27] audit: type=1804 audit(1587641977.493:10): pid=9192 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir582001587/syzkaller.sweB2R/19/file0/bus" dev="loop0" ino=316 res=1 [ 235.511604][ T27] audit: type=1800 audit(1587641977.493:11): pid=9192 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=316 res=0 11:39:37 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:37 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x5, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS={0xe20}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) write$binfmt_elf32(r2, &(0x7f00000011c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x5, 0x6, 0x20, 0x6, 0x2, 0x3, 0x200, 0x2d5, 0x38, 0x3bf, 0x4, 0x101, 0x20, 0x1, 0x3ff, 0x7, 0xff}, [{0x3, 0x2, 0xeee, 0x3, 0x3, 0x85a, 0x1, 0x3f}], "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", [[], []]}, 0x1258) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) read$alg(r6, &(0x7f00000001c0)=""/11, 0xb) sendfile(r5, r4, 0x0, 0x1002) ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, &(0x7f0000000080)=""/194) sendfile(r3, r1, 0x0, 0x1002) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000000)={0x9, 0x2, 0x1, 0x4, 'syz0\x00', 0xfff}) [ 235.828560][ T27] audit: type=1800 audit(1587641977.893:12): pid=9249 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=316 res=0 11:39:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x1002) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r5 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r7 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r7, 0x8200) ftruncate(r6, 0x0) 11:39:38 executing program 5: getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='vlan0\x00', 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x16140, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000340)) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="b2836abd52c2a0b8f328f0c329916615c7d0814babef70f58d50e2a7c8e9c86a8d45f468ea73628c990808c8cfe3a7edaabf84cc1de46f36d831c173a4a20e06ba9d0a2315b1f27e2f0a61f4302ddc960ac2dfe869faffaa9135cef37d824afe160f45f2af87208870", @ANYPTR], 0x87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000140)) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x70}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000c34) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_FWMARK={0x8, 0x12, 0x3e000}]}}]}, 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000640)={0x80, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0x80}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000005}}], 0x4000000000000d0, 0x0) [ 236.021217][ T27] audit: type=1804 audit(1587641977.903:13): pid=9192 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir582001587/syzkaller.sweB2R/19/file0/bus" dev="loop0" ino=316 res=1 11:39:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, 0xffffffffffffffff, 0x0, 0x1002) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000280)=0x5) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0x28, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x28}}, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r7, 0x0, 0x1002) getsockopt$PNPIPE_ENCAP(r7, 0x113, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) sendfile(r4, r3, 0x0, 0x100000001) r9 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4040, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r9, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, 0x1, 0x1, 0x802, 0x0, 0x0, {0x3}, [@CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x3}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x7}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x2}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3ff}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x804}, 0x4000012) 11:39:38 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 236.306292][ T9267] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 11:39:38 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:38 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 236.401701][ T9267] FAT-fs (loop1): Filesystem has been set read-only [ 236.419268][ T27] audit: type=1804 audit(1587641978.563:14): pid=9284 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir582001587/syzkaller.sweB2R/21/cgroup.controllers" dev="sda1" ino=15881 res=1 11:39:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r3 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r5, 0x8200) ftruncate(r4, 0x0) 11:39:38 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r3 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r5, 0x8200) ftruncate(r4, 0x0) 11:39:39 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 237.089479][ T27] audit: type=1804 audit(1587641979.223:15): pid=9307 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir582001587/syzkaller.sweB2R/21/cgroup.controllers" dev="sda1" ino=15881 res=1 [ 237.260382][ T9332] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 237.280751][ T9332] FAT-fs (loop1): Filesystem has been set read-only 11:39:39 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:39 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:39 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r5, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e20, 0xdeb7, @loopback, 0x7}, r5}}, 0x38) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x4, 0x80000000}) write$vhci(r0, &(0x7f0000000200)=@HCI_VENDOR_PKT={0xff, 0x41}, 0x2) 11:39:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r3 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r5, 0x8200) ftruncate(r4, 0x0) 11:39:39 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:39 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0, 0x0, 0x1}], 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6d61795f6469725f73697a655f6b623d3078303030303030303030303030303030322c6d61785f6469725f73697a655f6b623d3078303030303030010000000000000066"]) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 11:39:39 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:40 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:40 executing program 0: unshare(0x40000000) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/bus/input/handlers\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) pread64(r0, &(0x7f0000000080)=""/33, 0x21, 0x1000000000000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='1%\x00\x00', @ANYRES16=r4, @ANYBLOB="000126bd7000fcdbdf25000000001400020077673200000000000000000000000000060006004e2100000800050001000000"], 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000044) ioctl$SOUND_MIXER_WRITE_VOLUME(r1, 0xc0044d02, &(0x7f0000000000)=0x1b) 11:39:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r3 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r5, 0x8200) ftruncate(r4, 0x0) [ 238.291334][ T9383] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors 11:39:40 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:40 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 238.399794][ T9395] IPVS: ftp: loaded support on port[0] = 21 [ 238.437686][ T9383] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 238.529088][ T9398] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 238.537915][ T9398] FAT-fs (loop1): Filesystem has been set read-only [ 238.550357][ T9383] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 238.677265][ T9383] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:39:41 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000507d25a80648c63940d0624fc6000810a400c000000051a82c137153e670902018003001700d1bd", 0x2e}], 0x1}, 0x850) 11:39:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r3 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r5, 0x8200) ftruncate(r4, 0x0) 11:39:41 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 238.974833][ T9395] IPVS: ftp: loaded support on port[0] = 21 11:39:41 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20e041, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket(0x26, 0x80000, 0xfffffffc) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000240)=0x7, 0x4) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5800000024000b0f00000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100706965002c0002000800030003000000080002000100000008000300087c00000800030001000000080004001e000000eb740d406cd918cf2847fe08a463198881e70966179d08194b0b737b754861ef35c8627577bdb59bda041db0be65b76f6f2a118b000100000000000043431e9036de048661"], 0x3}}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020027bd7000fb9d5a2503000000080031000500000008", @ANYRES32=r4, @ANYBLOB="060028000100000005002a000100000008002b009e0e0000050029000000000008003a00ffff000005002a0000000000"], 0x5}, 0x1, 0x0, 0x0, 0x200048c4}, 0x4000000) fchdir(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r5, &(0x7f0000001440), 0xfffffc41) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0x1000, 0x4) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r5, 0x4000, 0x0, 0x4) 11:39:41 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 239.237905][ T9460] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 11:39:41 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:41 executing program 4: clone(0x84000180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x600, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) socket$inet(0x2, 0x80000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x1002) r4 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40000, 0x0) ioctl$KDSKBLED(r4, 0x4b65, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000080)={0xffffffff, 0x2, 0x25, {0x9, 0x8}, 0xb520, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1], 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000140)={{0x6, 0x7}, 0x0, 0x7, 0x4, {0xf8, 0x9}, 0x40, 0x10}) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsu\x00', 0x44400, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r5, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10009}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="94000000000b0102000000000000000000000002130001002f6465762f7474797072696e746b00000500010000000000080003400d00000108000340000000010800024000000005360001001b28706f7369785f61636c5f61636365737376626f786e6574316c6f6d643573756d256367726f757076626f786e65743100000008000340000000000800024000000003"], 0x90}}, 0x4) [ 239.330548][ T9460] FAT-fs (loop1): Filesystem has been set read-only 11:39:41 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{r2, r3+10000000}, {0x0, 0x3938700}}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x61, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) 11:39:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x8200) ftruncate(r3, 0x0) 11:39:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1002) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x1b, 0x5b, 0x39, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa44, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xfd3d}], "267e16a95c0800000000000000602922467fc12426", [[], [], [], [], [], [], [], [], [], []]}, 0xa8d) 11:39:41 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:41 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 239.817495][ T8564] tipc: TX() has been purged, node left! [ 240.059689][ T9494] kvm: emulating exchange as write 11:39:42 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x1a3042, 0x0) write$sndseq(r0, &(0x7f0000001400)=[{0x81, 0x6, 0x0, 0x0, @tick, {}, {}, @control}], 0x1c) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1002) flock(r2, 0x4) 11:39:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x8200) ftruncate(r3, 0x0) 11:39:42 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{r2, r3+10000000}, {0x0, 0x3938700}}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x61, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) 11:39:42 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{r2, r3+10000000}, {0x0, 0x3938700}}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x61, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) 11:39:42 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:42 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:42 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{r2, r3+10000000}, {0x0, 0x3938700}}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x61, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) 11:39:42 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:43 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:43 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1002) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {0x4}, 0x9}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 11:39:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000009c0)='./bus\x00', 0x1612c2, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x8200) ftruncate(r3, 0x0) [ 346.389957][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 346.397309][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P9517 [ 346.405061][ C1] (detected by 1, t=10502 jiffies, g=15841, q=27) [ 346.411670][ C1] syz-executor.3 R running task 27880 9517 7349 0x00004000 [ 346.419568][ C1] Call Trace: [ 346.423022][ C1] ? __schedule+0x937/0x1ff0 [ 346.427746][ C1] ? mark_held_locks+0x9f/0xe0 [ 346.432537][ C1] ? __sched_text_start+0x8/0x8 [ 346.437517][ C1] ? __this_cpu_preempt_check+0x28/0x190 [ 346.444010][ C1] ? smp_apic_timer_interrupt+0x1b6/0x600 [ 346.449837][ C1] ? preempt_schedule_thunk+0x16/0x18 [ 346.456001][ C1] preempt_schedule_common+0x4a/0xc0 [ 346.461950][ C1] preempt_schedule_thunk+0x16/0x18 [ 346.467252][ C1] ? debug_smp_processor_id+0x2f/0x185 [ 346.472910][ C1] rcu_lockdep_current_cpu_online+0xf7/0x130 [ 346.479000][ C1] rcu_read_lock_held_common+0xb8/0x130 [ 346.484553][ C1] rcu_read_lock_held+0x5a/0xb0 [ 346.489418][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 346.496204][ C1] mem_cgroup_throttle_swaprate+0x31f/0x64b [ 346.502146][ C1] mem_cgroup_try_charge_delay+0x67/0xa0 [ 346.507850][ C1] shmem_getpage_gfp+0x7f4/0x2a10 [ 346.512891][ C1] ? shmem_unused_huge_scan+0xb0/0xb0 [ 346.518311][ C1] ? __set_page_dirty_no_writeback+0x1fa/0x380 [ 346.524553][ C1] ? balance_dirty_pages_ratelimited+0x160/0x1d50 [ 346.531321][ C1] ? iov_iter_fault_in_readable+0x1f8/0x3f0 [ 346.538008][ C1] shmem_write_begin+0x102/0x1e0 [ 346.543004][ C1] generic_perform_write+0x20a/0x4e0 [ 346.548304][ C1] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 346.556970][ C1] ? update_time+0xc0/0xc0 [ 346.561664][ C1] ? down_write+0xdb/0x150 [ 346.566173][ C1] __generic_file_write_iter+0x24c/0x610 [ 346.571818][ C1] generic_file_write_iter+0x3f3/0x630 [ 346.577277][ C1] ? __generic_file_write_iter+0x610/0x610 [ 346.583272][ C1] ? mark_held_locks+0xe0/0xe0 [ 346.588033][ C1] ? timestamp_truncate+0x20f/0x2f0 [ 346.593301][ C1] new_sync_write+0x4a2/0x700 [ 346.597981][ C1] ? new_sync_read+0x7a0/0x7a0 [ 346.602758][ C1] ? rcu_read_lock_any_held+0xcd/0xf0 [ 346.608761][ C1] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 346.614046][ C1] __vfs_write+0xc9/0x100 [ 346.619507][ C1] vfs_write+0x268/0x5d0 [ 346.623763][ C1] ksys_pwrite64+0x175/0x1a0 [ 346.628353][ C1] ? __ia32_sys_pread64+0xf0/0xf0 [ 346.633372][ C1] ? __this_cpu_preempt_check+0x28/0x190 [ 346.639083][ C1] ? trace_hardirqs_off_caller+0x55/0x230 [ 346.644810][ C1] do_syscall_64+0xf6/0x7d0 [ 346.649405][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 346.655858][ C1] RIP: 0033:0x416687 [ 346.660809][ C1] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 346.680606][ C1] RSP: 002b:00007f279544aa60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 346.689017][ C1] RAX: ffffffffffffffda RBX: 0000000000508240 RCX: 0000000000416687 [ 346.697263][ C1] RDX: 0000000008100000 RSI: 0000000020000580 RDI: 0000000000000005 [ 346.705422][ C1] RBP: 000000000078bfa0 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 346.713474][ C1] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000ffffffff [ 346.721448][ C1] R13: 0000000000000bde R14: 00000000004cdfbd R15: 00007f279544b6d4 [ 346.729442][ C1] rcu: rcu_preempt kthread starved for 10502 jiffies! g15841 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 346.740731][ C1] rcu: RCU grace-period kthread stack dump: [ 346.746712][ C1] rcu_preempt R running task 28848 10 2 0x80004000 [ 346.755294][ C1] Call Trace: [ 346.758597][ C1] ? __schedule+0x937/0x1ff0 [ 346.763367][ C1] ? __sched_text_start+0x8/0x8 [ 346.768217][ C1] ? _raw_spin_lock_irqsave+0x94/0xbf [ 346.773671][ C1] ? debug_smp_processor_id+0x2f/0x185 [ 346.779132][ C1] schedule+0xd0/0x2a0 [ 346.783211][ C1] schedule_timeout+0x35c/0x850 [ 346.788076][ C1] ? find_held_lock+0x2d/0x110 [ 346.793209][ C1] ? usleep_range+0x160/0x160 [ 346.798062][ C1] ? rcu_gp_kthread+0x6fd/0x1960 [ 346.803085][ C1] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 346.808949][ C1] ? __next_timer_interrupt+0x190/0x190 [ 346.814547][ C1] ? prepare_to_swait_exclusive+0x110/0x110 [ 346.820446][ C1] rcu_gp_kthread+0x9bf/0x1960 [ 346.825217][ C1] ? rcu_barrier+0x4b0/0x4b0 [ 346.829808][ C1] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 346.835746][ C1] ? lockdep_hardirqs_on+0x463/0x620 [ 346.841127][ C1] ? __kthread_parkme+0x13f/0x1e0 [ 346.846162][ C1] ? rcu_barrier+0x4b0/0x4b0 [ 346.850762][ C1] kthread+0x388/0x470 [ 346.855316][ C1] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 346.861124][ C1] ret_from_fork+0x24/0x30