[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 33.074070] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.383003] kauditd_printk_skb: 10 callbacks suppressed [ 33.383012] audit: type=1400 audit(1570108703.060:35): avc: denied { map } for pid=6956 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 33.439160] random: sshd: uninitialized urandom read (32 bytes read) [ 34.033069] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.229' (ECDSA) to the list of known hosts. [ 39.748069] random: sshd: uninitialized urandom read (32 bytes read) 2019/10/03 13:18:29 fuzzer started [ 39.937962] audit: type=1400 audit(1570108709.610:36): avc: denied { map } for pid=6966 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 40.619712] random: cc1: uninitialized urandom read (8 bytes read) 2019/10/03 13:18:31 dialing manager at 10.128.0.105:38761 2019/10/03 13:18:31 syscalls: 2500 2019/10/03 13:18:31 code coverage: enabled 2019/10/03 13:18:31 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/10/03 13:18:31 extra coverage: extra coverage is not supported by the kernel 2019/10/03 13:18:31 setuid sandbox: enabled 2019/10/03 13:18:31 namespace sandbox: enabled 2019/10/03 13:18:31 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/03 13:18:31 fault injection: enabled 2019/10/03 13:18:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/03 13:18:31 net packet injection: enabled 2019/10/03 13:18:31 net device setup: enabled [ 42.579083] random: crng init done 13:20:30 executing program 0: 13:20:30 executing program 3: 13:20:30 executing program 1: 13:20:30 executing program 5: 13:20:30 executing program 4: 13:20:30 executing program 2: [ 161.234930] audit: type=1400 audit(1570108830.910:37): avc: denied { map } for pid=6984 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13762 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 161.452002] IPVS: ftp: loaded support on port[0] = 21 [ 161.790554] IPVS: ftp: loaded support on port[0] = 21 [ 161.837151] chnl_net:caif_netlink_parms(): no params data found [ 161.883932] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.890666] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.897839] device bridge_slave_0 entered promiscuous mode [ 161.905385] IPVS: ftp: loaded support on port[0] = 21 [ 161.910902] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.917319] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.924872] device bridge_slave_1 entered promiscuous mode [ 161.951003] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 161.968587] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.015728] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.023302] team0: Port device team_slave_0 added [ 162.032246] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.039260] team0: Port device team_slave_1 added [ 162.044570] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 162.053598] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 162.061357] chnl_net:caif_netlink_parms(): no params data found [ 162.083436] IPVS: ftp: loaded support on port[0] = 21 [ 162.112638] device hsr_slave_0 entered promiscuous mode [ 162.150394] device hsr_slave_1 entered promiscuous mode [ 162.202214] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 162.209673] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 162.235643] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.242200] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.249082] device bridge_slave_0 entered promiscuous mode [ 162.277509] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.284103] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.291172] device bridge_slave_1 entered promiscuous mode [ 162.326969] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 162.337858] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.346416] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.352836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.359581] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.366095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.375586] chnl_net:caif_netlink_parms(): no params data found [ 162.416026] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.423173] team0: Port device team_slave_0 added [ 162.447862] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.454545] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.461917] device bridge_slave_0 entered promiscuous mode [ 162.468295] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.475890] team0: Port device team_slave_1 added [ 162.492356] IPVS: ftp: loaded support on port[0] = 21 [ 162.499251] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.507378] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.514703] device bridge_slave_1 entered promiscuous mode [ 162.529562] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 162.585317] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 162.593390] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 162.653005] device hsr_slave_0 entered promiscuous mode [ 162.700334] device hsr_slave_1 entered promiscuous mode [ 162.741948] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.750140] chnl_net:caif_netlink_parms(): no params data found [ 162.772837] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 162.795658] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 162.833689] IPVS: ftp: loaded support on port[0] = 21 [ 162.845559] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.853684] team0: Port device team_slave_0 added [ 162.865905] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 162.873071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.879413] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.886242] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.893408] device bridge_slave_0 entered promiscuous mode [ 162.901140] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.907482] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.914438] device bridge_slave_1 entered promiscuous mode [ 162.921535] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.928647] team0: Port device team_slave_1 added [ 162.934211] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 162.944548] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.951497] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.958388] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 162.985727] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 163.012518] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 163.021027] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 163.030880] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 163.082202] device hsr_slave_0 entered promiscuous mode [ 163.130443] device hsr_slave_1 entered promiscuous mode [ 163.192802] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 163.226608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.233667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.242004] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 163.262998] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 163.269558] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 163.277571] team0: Port device team_slave_0 added [ 163.287389] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 163.297739] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 163.304546] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.311635] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 163.318688] team0: Port device team_slave_1 added [ 163.327163] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 163.337145] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 163.352568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 163.363151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 163.373182] chnl_net:caif_netlink_parms(): no params data found [ 163.391885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.399732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.408114] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.414659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.421706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.429398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.437172] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.443557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.457960] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 163.467970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 163.523477] device hsr_slave_0 entered promiscuous mode [ 163.561110] device hsr_slave_1 entered promiscuous mode [ 163.610851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.618686] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 163.632345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 163.642959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 163.650199] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 163.658077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.666064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.673978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.712665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 163.720535] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.727425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.736536] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.782616] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 163.791630] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 163.799026] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 163.807227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.816819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.824445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.832140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.853187] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 163.859211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.868653] chnl_net:caif_netlink_parms(): no params data found [ 163.877246] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.884122] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.891368] device bridge_slave_0 entered promiscuous mode [ 163.899198] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.905809] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.913194] device bridge_slave_1 entered promiscuous mode [ 163.940534] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.959319] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 163.968983] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 163.982335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 163.994972] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 164.021780] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 164.031587] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 164.037674] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.052863] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.065974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.073688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.081032] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 164.088191] team0: Port device team_slave_0 added [ 164.102161] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.108580] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.115593] device bridge_slave_0 entered promiscuous mode [ 164.123096] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.129449] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.136929] device bridge_slave_1 entered promiscuous mode [ 164.144558] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 164.152482] team0: Port device team_slave_1 added [ 164.157847] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 164.166120] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 164.177269] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 164.192311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.200006] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 164.207939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.215902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.224106] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.230506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.237347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.245670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.253523] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.259889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.268604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 164.282546] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.291041] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 164.300441] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 164.313638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.321851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.329595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.337048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.345485] bond0: Enslaving bond_slave_0 as an active interface with an up link 13:20:34 executing program 0: [ 164.364388] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 164.403611] device hsr_slave_0 entered promiscuous mode 13:20:34 executing program 0: 13:20:34 executing program 0: [ 164.430610] device hsr_slave_1 entered promiscuous mode [ 164.463094] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 164.469997] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 13:20:34 executing program 0: 13:20:34 executing program 0: [ 164.493466] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 164.511197] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 164.519874] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 13:20:34 executing program 0: 13:20:34 executing program 0: [ 164.538668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.549247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.556800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.572772] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 164.578880] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.592571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 164.605057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.620581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.631910] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 164.639680] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 164.646234] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.659295] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 164.667416] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.674665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.682878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.692259] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 164.699959] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 164.707393] team0: Port device team_slave_0 added [ 164.713493] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 164.721060] team0: Port device team_slave_1 added [ 164.726624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 164.735701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.743441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.751433] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.757767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.765065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.773329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 164.780897] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 164.789440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 164.798740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 164.810573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.818346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.826350] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.832830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.839643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.847461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.855022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.862981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.870770] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.877101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.888446] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.896934] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 164.928968] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 164.936776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.947242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.955864] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.962263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.969110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.976968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.985648] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 164.993955] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 165.053567] device hsr_slave_0 entered promiscuous mode [ 165.090512] device hsr_slave_1 entered promiscuous mode [ 165.137412] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 165.143834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.152035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.163925] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.171953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 165.181181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 165.188328] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 165.196616] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 165.205331] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 165.214015] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 165.220660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.228274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.235972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.242771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.251612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 165.266392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 165.274250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 165.282636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.290742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.298207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.306006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.313761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.321794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.329417] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.336507] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.349102] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.361871] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 165.367967] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.375263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 165.383787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 165.392285] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 165.399683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.408239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.415854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.424835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.436815] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 165.448014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 165.457529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 165.464619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.472794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.480335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.488001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.495666] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.502018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.509073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.516845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.524695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.534272] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 165.540520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.549289] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 165.558771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 165.567257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.575350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.583362] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.589745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.596960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.605868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.617978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 165.628392] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 165.634914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.644357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.655205] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 165.665540] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 165.672603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.705700] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 165.719302] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 165.726290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.736796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.745766] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.761060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 165.768430] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.780542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.788148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.800743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.810836] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.825744] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 165.836247] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 165.845446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.853686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.861662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.869558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.879448] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 165.896765] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 165.903370] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.916917] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 165.926855] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 165.933447] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.942114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.949608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.957642] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 165.968876] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.979257] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 165.999981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.008336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.027051] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.033507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.041303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.050971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 166.062123] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 166.068962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:20:35 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0xa5}, {0x0}, {0x0}, {&(0x7f0000000000)="a49b6631ed7308a7b0c87a2bbff7b94efc08ab12f728db4b2b4d2f2fba03988cdcdf96ac4fad0b3a47006db763e3", 0x129}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:20:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000380)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010003080800418e00000004fcff", 0x58}], 0x1) [ 166.077974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.087230] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.093643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.101322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.115150] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 166.133449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.144100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 166.154607] ptrace attach of "/root/syz-executor.3"[7065] was attempted by "/root/syz-executor.3"[7066] [ 166.162137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 166.177231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.185451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.193766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.201545] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.209339] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.222830] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 166.257038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.277947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.295873] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 166.304337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.312038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.326096] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 166.332441] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.345839] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 166.355343] 8021q: adding VLAN 0 to HW filter on device batadv0 13:20:37 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x500000000000000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffffec, 0x0, 0x0, 0x0) 13:20:37 executing program 1: r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) accept4(r0, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 13:20:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x7fffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) 13:20:37 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 13:20:37 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x0) 13:20:37 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) write(r0, &(0x7f0000000000)="d6e5344f8256ed6db870f68ff7c68e2fd1", 0x11) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x500000000000000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffffec, 0x0, 0x0, 0x0) 13:20:37 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000a00000a1f000007002808000800084004000304", 0x24}], 0x1}, 0x0) [ 167.663144] hrtimer: interrupt took 39034 ns [ 167.665344] mmap: syz-executor.2 (7097) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 13:20:37 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) renameat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000003c0)='./file0\x00') 13:20:37 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) renameat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000003c0)='./file0\x00') 13:20:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x18000, 0x0) 13:20:37 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) write(r0, &(0x7f0000000000)="d6e5344f8256ed6db870f68ff7c68e2fd1", 0x11) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x500000000000000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffffec, 0x0, 0x0, 0x0) 13:20:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)) 13:20:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800005, 0x1}) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getpgrp(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) 13:20:37 executing program 1: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000180), 0x4) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800005, 0x1}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)="da", 0x1}, {0x0}], 0x2}, 0x0) [ 167.913716] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 13:20:37 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget(0x0, 0x0) alarm(0x0) [ 168.070303] protocol 88fb is buggy, dev hsr_slave_0 [ 168.075583] protocol 88fb is buggy, dev hsr_slave_1 [ 168.150256] protocol 88fb is buggy, dev hsr_slave_0 [ 168.155398] protocol 88fb is buggy, dev hsr_slave_1 [ 168.390119] protocol 88fb is buggy, dev hsr_slave_0 [ 168.390228] protocol 88fb is buggy, dev hsr_slave_0 [ 168.395249] protocol 88fb is buggy, dev hsr_slave_1 [ 168.400272] protocol 88fb is buggy, dev hsr_slave_1 13:20:38 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 13:20:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab008048080000004600010700000014190001c010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 13:20:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3f) 13:20:38 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) write(r0, &(0x7f0000000000)="d6e5344f8256ed6db870f68ff7c68e2fd1", 0x11) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x500000000000000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffffec, 0x0, 0x0, 0x0) 13:20:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2003103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() r1 = syz_open_procfs(0x0, &(0x7f00000006c0)='syscall\x00') socket$inet6(0xa, 0x0, 0x0) open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x40800007fffffdc) 13:20:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') sendfile(r0, r0, 0x0, 0x699) 13:20:38 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 13:20:38 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x386, &(0x7f0000000100)=[{&(0x7f0000000040)="5500000018007f6800fe01b2a4a280930a060001fe80000214000000390009", 0x12a}], 0x1}, 0xfffffffffffffffe) r0 = socket(0x800000010, 0x1000000002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492596, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 13:20:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@ipv4_newroute={0x24, 0x18, 0xde2e4bd907ed11cd, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8}]}, 0x24}}, 0x0) 13:20:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') sendfile(r0, r0, 0x0, 0x699) 13:20:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syslog(0x9, 0x0, 0x0) 13:20:38 executing program 5: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d6000/0x1000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00[\xaaZ\xaf\xc0\x8c\xaa\xaf\xc1DP\xf0_\'\xaf\xeb\x19s\xf3\xafp\xcam\x14\x9cR\x8d\xefh\xbb\xca\xfc\xdeF4\xbbc\x93\xae\xbf\xe6\x7fJL]\xb7\xc0#;,F\xc2\xc8\x93<\x0f7\xe4\x01\xc0\xa6#\x82\x02\xcdT\x02l\x80\xff\xf8\xd8YQL\x06\xdexu!\xb32$\x04&e\\^\xe0nZ') preadv(r2, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) [ 168.790105] protocol 88fb is buggy, dev hsr_slave_0 [ 168.795269] protocol 88fb is buggy, dev hsr_slave_1 [ 168.814972] audit: type=1400 audit(1570108838.480:38): avc: denied { syslog } for pid=7193 comm="syz-executor.4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 13:20:39 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 13:20:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$cgroup_int(r0, &(0x7f0000000180)='cgroup.max.descendants\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=""/228, 0xe4}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 13:20:39 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='fd\x00', 0x0) mlockall(0x2) write(r0, &(0x7f0000000180)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) 13:20:39 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000a00)=[{{0x0, 0x0, 0x0}, 0x68ac}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 13:20:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="580000002400070600"/20, @ANYRES32=r2, @ANYBLOB="00400000ffffffff00000000340008001c0001000300000000000000000000000000000000000000070000001400020000000000000000002f00000000000000"], 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 13:20:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000001000b93675010000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c00020037ff1400ffffffff"], 0x3c}}, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @loopback}, 0xc) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth1\x00', 0x1}, 0x18) 13:20:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4c87a2bbff7b94efc08ab12f728db4b2b4d2f2fba03988cdcdf96ac4fad0b3a47006db763e3a227deb6999d32772cf2eebb1fb554d54ac45a333c28785d630f38ba0fd5e2d5fb109aa4d1a2d25799eb00ea36a133349cce8d7986f5f3a2518643b1287105afeb7e79bb42eeee8a0df724d9fdd5090088e5fe4c7c6ef0b6cff45a2320b2b44ad18c8a97430df5ad0856d0e97d5911c707ef3e3c09ea654ed13e9defea72e230f0fa9aa793d930a0979b43b652bfd4c9c460ab5479129e80407dab9fa03db5aa3921dc1da850ee9347e696f79d6b7622b8356c63929d1e936bd6e1ac8c0edd626d96d3685e7aa647cab4", 0xf0}], 0x4, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 169.564872] audit: type=1400 audit(1570108839.240:39): avc: denied { map } for pid=7210 comm="syz-executor.4" path=2F6D656D66643A6664202864656C6574656429 dev="tmpfs" ino=27804 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 13:20:39 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@rand_addr="bd9afada3e2f91b879eaa320d047b2c6", @in6=@remote}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) 13:20:39 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x40, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = request_key(0x0, 0x0, &(0x7f0000000b00)='eth0vmnet0\x00', 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000100), 0x0, 0x0, 0x0) keyctl$link(0x8, 0x0, r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="56efbba6e8aee7b4059f00000000f9002d00000000e789317f09e4cdcf459fd5196691cde10e015e8f"], 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@empty, @in=@broadcast}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r3, &(0x7f00000015c0)=[{{&(0x7f00000004c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000000)=""/2, 0x2}, {&(0x7f0000000600)=""/242, 0xf2}, {&(0x7f0000000300)=""/61, 0x3d}], 0x3, &(0x7f0000000700)=""/79, 0x4f}, 0xfff}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000f40)=""/201, 0xc9}, {&(0x7f0000000540)=""/44, 0x2c}, {&(0x7f0000001040)=""/105, 0x69}, {&(0x7f00000010c0)=""/194, 0xc2}, {&(0x7f0000001e40)=""/4096, 0x1000}], 0x5, &(0x7f0000000880)=""/42, 0x2a}, 0xffff0001}, {{&(0x7f00000012c0)=@nl=@unspec, 0x80, &(0x7f0000000a80)=[{&(0x7f0000001340)=""/197, 0xc5}], 0x1, &(0x7f0000002e40)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000001440)=@x25={0x9, @remote}, 0x80, &(0x7f0000001500)=[{&(0x7f00000014c0)=""/61, 0x3d}], 0x1, &(0x7f0000001540)=""/73, 0x49}, 0x200}], 0x4, 0xd9e379eaf0b34a37, &(0x7f0000001740)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001780)={'nr0\x00', r4}) clock_adjtime(0x0, &(0x7f00000008c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x100000001, 0x6, 0x0, 0xa18f, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400, 0x2, 0x3f, 0xe0ac, 0x9b, 0xfffffffffffffff8, 0x6, 0x1, 0x1}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000180)=@generic={0x0, 0x4}) 13:20:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) inotify_init1(0x1800) [ 169.662487] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 169.676092] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 169.691323] IPVS: sync thread started: state = MASTER, mcast_ifn = veth1, syncid = 1, id = 0 13:20:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=@newqdisc={0x444, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x418, 0x2, [@TCA_CBQ_RTAB={0x404}, @TCA_CBQ_RATE={0x10, 0x5, {0x6, 0x0, 0x0, 0x0, 0x0, 0x5}}]}}]}, 0x444}}, 0x0) [ 169.766168] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 13:20:39 executing program 1: sendmsg(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x40, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = request_key(0x0, 0x0, &(0x7f0000000b00)='eth0vmnet0\x00', 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000100), 0x0, 0x0, 0x0) keyctl$link(0x8, 0x0, r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="56efbba6e8aee7b4059f00000000f9002d00000000e789317f09e4cdcf459fd5196691cde10e015e8f"], 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@empty, @in=@broadcast}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r3, 0x0, 0x0, 0xd9e379eaf0b34a37, &(0x7f0000001740)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001780)={'nr0\x00'}) clock_adjtime(0x0, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000180)=@generic={0x0, 0x4}) [ 169.826461] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7250 comm=syz-executor.2 [ 169.875253] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 169.888287] FAT-fs (loop3): Filesystem has been set read-only [ 169.905835] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 169.951985] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 169.966767] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 169.979163] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 170.020561] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 170.028489] FAT-fs (loop1): Filesystem has been set read-only [ 170.051482] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 170.060765] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 13:20:40 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) 13:20:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r6 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, r6, 0x1) perf_event_open(0x0, r6, 0xe, 0xffffffffffffffff, 0x1) r7 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r7, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x72c6831c) 13:20:40 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000340)={0x0, 0x6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xa454a72f209dea1f) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:20:40 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x40, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = request_key(0x0, 0x0, &(0x7f0000000b00)='eth0vmnet0\x00', 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000100), 0x0, 0x0, 0x0) keyctl$link(0x8, 0x0, r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="56efbba6e8aee7b4059f00000000f9002d00000000e789317f09e4cdcf459fd5196691cde10e015e8f"], 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@empty, @in=@broadcast}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r3, &(0x7f00000015c0)=[{{&(0x7f00000004c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000000)=""/2, 0x2}, {&(0x7f0000000600)=""/242, 0xf2}, {&(0x7f0000000300)=""/61, 0x3d}], 0x3, &(0x7f0000000700)=""/79, 0x4f}, 0xfff}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000f40)=""/201, 0xc9}, {&(0x7f0000000540)=""/44, 0x2c}, {&(0x7f0000001040)=""/105, 0x69}, {&(0x7f00000010c0)=""/194, 0xc2}, {&(0x7f0000001e40)=""/4096, 0x1000}], 0x5, &(0x7f0000000880)=""/42, 0x2a}, 0xffff0001}, {{&(0x7f00000012c0)=@nl=@unspec, 0x80, &(0x7f0000000a80)=[{&(0x7f0000001340)=""/197, 0xc5}], 0x1, &(0x7f0000002e40)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000001440)=@x25={0x9, @remote}, 0x80, &(0x7f0000001500)=[{&(0x7f00000014c0)=""/61, 0x3d}], 0x1, &(0x7f0000001540)=""/73, 0x49}, 0x200}], 0x4, 0xd9e379eaf0b34a37, &(0x7f0000001740)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001780)={'nr0\x00', r4}) clock_adjtime(0x0, &(0x7f00000008c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x100000001, 0x6, 0x0, 0xa18f, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400, 0x2, 0x3f, 0xe0ac, 0x9b, 0xfffffffffffffff8, 0x6, 0x1, 0x1}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000180)=@generic={0x0, 0x4}) 13:20:40 executing program 1: sendmsg(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x40, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = request_key(0x0, 0x0, &(0x7f0000000b00)='eth0vmnet0\x00', 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000100), 0x0, 0x0, 0x0) keyctl$link(0x8, 0x0, r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="56efbba6e8aee7b4059f00000000f9002d00000000e789317f09e4cdcf459fd5196691cde10e015e8f"], 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@empty, @in=@broadcast}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r3, 0x0, 0x0, 0xd9e379eaf0b34a37, &(0x7f0000001740)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001780)={'nr0\x00'}) clock_adjtime(0x0, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000180)=@generic={0x0, 0x4}) 13:20:40 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653020d0"], 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) msgsnd(0x0, &(0x7f00000002c0), 0x8, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) [ 170.588843] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 170.663646] FAT-fs (loop3): Filesystem has been set read-only [ 170.690015] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 170.752120] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 170.789960] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 170.837770] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 170.867889] FAT-fs (loop1): Filesystem has been set read-only [ 170.879793] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 170.887861] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 170.906398] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 170.914985] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) [ 170.938810] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000500) 13:20:42 executing program 3: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653020d0"], 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) msgsnd(0x0, &(0x7f00000002c0), 0x8, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 13:20:42 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653020d0"], 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) msgsnd(0x0, &(0x7f00000002c0), 0x8, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 13:20:42 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000, 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xc05eb68) unlink(&(0x7f0000000480)='./file0\x00') link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='./file0\x00') 13:20:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(0x0, 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00140600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000800000000000"], 0x0) syz_emit_ethernet(0x10041, &(0x7f0000000000)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @remote, @empty}, &(0x7f0000000700)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$KDGETLED(r2, 0x4b31, 0x0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x3, &(0x7f0000000300)=0x8, 0x1ec) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x0, 0x0, 0x0, {}, [@generic="ffd38d", @nested={0xc, 0x1, [@typed={0x8, 0x3, @ipv4=@multicast1=0x4000300}]}]}, 0x24}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='N\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x20, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 13:20:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r6 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, r6, 0x1) perf_event_open(0x0, r6, 0xe, 0xffffffffffffffff, 0x1) r7 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r7, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x72c6831c) 13:20:42 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000340)={0x0, 0x6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xa454a72f209dea1f) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:20:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000200)=0x1) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r0, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r2, 0x4) r3 = gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) getpgid(r3) r4 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x0, 0x7a], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) 13:20:42 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653020d0"], 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) msgsnd(0x0, &(0x7f00000002c0), 0x8, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 13:20:42 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653020d0"], 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) msgsnd(0x0, &(0x7f00000002c0), 0x8, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) [ 172.797185] audit: type=1400 audit(1570108842.450:40): avc: denied { create } for pid=7317 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 13:20:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000200)=0x1) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r0, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r2, 0x4) r3 = gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) getpgid(r3) r4 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x0, 0x7a], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) 13:20:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffffffffffff05) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0xa0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r4 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r4, &(0x7f0000000000)={0x17}, 0x56) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r6, &(0x7f0000000400)={0xf9}, 0xffffffffffffff63) splice(r5, 0x0, r6, 0x0, 0x3, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) creat(&(0x7f0000000740)='./bus\x00', 0x10) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r7, 0x2) flock(r7, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) flock(r8, 0x5) flock(r8, 0x2) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @empty}, &(0x7f0000000340)=0xc) r10 = add_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000001c0)="a9c3110280029b4f8ce1f626367afbbbd7a623511a7abbebcc02595db50406b19ea213e2", 0x24, 0xffffffffffffffff) keyctl$get_security(0x11, r10, &(0x7f00000010c0)=""/4096, 0x1000) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0x0, r9}) [ 172.996738] audit: type=1400 audit(1570108842.480:41): avc: denied { write } for pid=7317 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 13:20:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10}, 0x2c) [ 173.049500] syz-executor.4 (7319) used greatest stack depth: 23744 bytes left 13:20:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(0x0, 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00140600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000800000000000"], 0x0) syz_emit_ethernet(0x10041, &(0x7f0000000000)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @remote, @empty}, &(0x7f0000000700)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$KDGETLED(r2, 0x4b31, 0x0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x3, &(0x7f0000000300)=0x8, 0x1ec) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x0, 0x0, 0x0, {}, [@generic="ffd38d", @nested={0xc, 0x1, [@typed={0x8, 0x3, @ipv4=@multicast1=0x4000300}]}]}, 0x24}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='N\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x20, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000) [ 173.104080] audit: type=1400 audit(1570108842.690:42): avc: denied { read } for pid=7317 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 13:20:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(0x0, 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00140600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000800000000000"], 0x0) syz_emit_ethernet(0x10041, &(0x7f0000000000)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @remote, @empty}, &(0x7f0000000700)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$KDGETLED(r2, 0x4b31, 0x0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x3, &(0x7f0000000300)=0x8, 0x1ec) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x0, 0x0, 0x0, {}, [@generic="ffd38d", @nested={0xc, 0x1, [@typed={0x8, 0x3, @ipv4=@multicast1=0x4000300}]}]}, 0x24}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='N\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x20, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 13:20:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(0x0, 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00140600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000800000000000"], 0x0) syz_emit_ethernet(0x10041, &(0x7f0000000000)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @remote, @empty}, &(0x7f0000000700)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$KDGETLED(r2, 0x4b31, 0x0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x3, &(0x7f0000000300)=0x8, 0x1ec) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x0, 0x0, 0x0, {}, [@generic="ffd38d", @nested={0xc, 0x1, [@typed={0x8, 0x3, @ipv4=@multicast1=0x4000300}]}]}, 0x24}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='N\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x20, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 13:20:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000080010000502000007668fe55a"], 0x30}}, 0x0) 13:20:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(0x0, 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00140600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000800000000000"], 0x0) syz_emit_ethernet(0x10041, &(0x7f0000000000)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @remote, @empty}, &(0x7f0000000700)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$KDGETLED(r2, 0x4b31, 0x0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x3, &(0x7f0000000300)=0x8, 0x1ec) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x0, 0x0, 0x0, {}, [@generic="ffd38d", @nested={0xc, 0x1, [@typed={0x8, 0x3, @ipv4=@multicast1=0x4000300}]}]}, 0x24}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='N\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x20, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 13:20:43 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/86, 0x56) 13:20:43 executing program 4: syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8004700b, &(0x7f0000000080)) 13:20:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000000c0)={[{@min_batch_time={'min_batch_time', 0x3d, 0x300000000000000}}], [], 0x700}) 13:20:43 executing program 2: 13:20:43 executing program 4: [ 173.615613] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.645250] bridge0: port 2(bridge_slave_1) entered disabled state 13:20:43 executing program 0: 13:20:43 executing program 2: 13:20:43 executing program 4: 13:20:43 executing program 3: 13:20:43 executing program 1: 13:20:43 executing program 5: 13:20:43 executing program 2: 13:20:43 executing program 2: 13:20:43 executing program 0: 13:20:43 executing program 3: 13:20:43 executing program 4: 13:20:43 executing program 1: 13:20:43 executing program 5: 13:20:43 executing program 2: 13:20:43 executing program 4: 13:20:43 executing program 3: 13:20:43 executing program 1: 13:20:43 executing program 5: 13:20:43 executing program 2: 13:20:43 executing program 0: 13:20:43 executing program 2: 13:20:43 executing program 1: 13:20:43 executing program 5: 13:20:43 executing program 3: 13:20:43 executing program 0: 13:20:43 executing program 4: 13:20:43 executing program 3: 13:20:43 executing program 5: 13:20:43 executing program 4: 13:20:43 executing program 0: 13:20:43 executing program 2: 13:20:43 executing program 4: 13:20:43 executing program 1: 13:20:43 executing program 5: 13:20:44 executing program 3: 13:20:44 executing program 0: 13:20:44 executing program 2: 13:20:44 executing program 1: 13:20:44 executing program 4: 13:20:44 executing program 5: 13:20:44 executing program 0: 13:20:44 executing program 1: 13:20:44 executing program 4: 13:20:44 executing program 2: 13:20:44 executing program 3: 13:20:44 executing program 5: 13:20:44 executing program 2: 13:20:44 executing program 0: 13:20:44 executing program 1: 13:20:44 executing program 4: 13:20:44 executing program 3: 13:20:44 executing program 5: 13:20:44 executing program 2: 13:20:44 executing program 4: 13:20:44 executing program 0: 13:20:44 executing program 1: 13:20:44 executing program 3: 13:20:44 executing program 5: 13:20:44 executing program 1: 13:20:44 executing program 0: 13:20:44 executing program 5: 13:20:44 executing program 4: 13:20:44 executing program 2: 13:20:44 executing program 3: 13:20:44 executing program 0: 13:20:44 executing program 5: 13:20:44 executing program 2: 13:20:44 executing program 4: 13:20:44 executing program 1: 13:20:44 executing program 3: 13:20:44 executing program 0: 13:20:44 executing program 2: 13:20:44 executing program 1: 13:20:44 executing program 5: 13:20:44 executing program 4: 13:20:44 executing program 3: 13:20:44 executing program 0: 13:20:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xffffffffffffff60, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) pread64(0xffffffffffffffff, 0x0, 0x50, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/anycast6\x00') setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000140)={0xfffffff9}, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @dev}, &(0x7f0000000100)=0xc) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x4000) 13:20:44 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x9, &(0x7f0000000100)=[{0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000001c0)={r2}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0x47b, 0x10000}], 0x800010, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x400100, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x51a, 0x232040) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000440)=r4) ioctl$UFFDIO_WAKE(r5, 0x8010aa02, &(0x7f0000000300)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000280)=[0x1, 0x8]) recvfrom$llc(r5, &(0x7f0000000480)=""/197, 0xc5, 0x20, &(0x7f0000000580)={0x1a, 0x337, 0xfa, 0x70, 0x41, 0x8, @random="d0a202917f24"}, 0x10) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x6800) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) accept(0xffffffffffffffff, &(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000640)=0x80) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r1, 0x1}) 13:20:44 executing program 3: ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r0 = socket(0x11, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3", 0x1f, r1) r2 = add_key(&(0x7f0000000300)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000240)="01", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0xee00, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4", 0x5b, r2) keyctl$dh_compute(0x17, 0x0, 0x0, 0x248, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, 0x0, 0x252}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000004c0), &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000480)={0x0, 0x3f, 0x1}, 0x8) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f0000000300)) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x11) wait4(r3, 0x0, 0x2, 0x0) 13:20:44 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000440)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b465abb4c921955fb6086244113182b8f313593c4f226eb613cd116ca4a388a9782d215e5884f52b2d77743051d52101ea9e6b5f4732a3001bd23896", 0x1c3, r1) r3 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000700)='X', 0x1, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) socket$caif_stream(0x25, 0x1, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r2}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 13:20:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0xfffffffffffffd71, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000190007041dfffd946f6105000a000300fe0200000001080008001e000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'nr0\x00', 0x1}) prctl$PR_GET_FP_MODE(0x2e) 13:20:44 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x20000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='lotrusted\x1a\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x36656510, 0x8000) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000), 0x4) ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14, r5, 0xb20976689abf09df, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x6c, r5, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x35}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x4440) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x1) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x61883bea5100b932, 0x0) write$P9_RREAD(r7, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x163) ioctl$TIOCGSID(r7, 0x5429, &(0x7f00000001c0)=0x0) socket$tipc(0x1e, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) sendmsg$nl_generic(r0, &(0x7f0000000ac0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000110}, 0xc, &(0x7f0000000240)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r9, @ANYBLOB='\b\x00', @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x800}, 0x801) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0xfffffffffffffefd, 0x1, &(0x7f0000000180), 0x10000000000000a2) [ 175.182877] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 159 transid 17050532955254037791 /dev/loop5 13:20:44 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$selinux_context(0xffffffffffffffff, &(0x7f0000000000)='system_u:object_r:lib_t:s0\x00', 0x1b) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RVERSION(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x167) write$P9_RAUTH(r2, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r2, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) [ 175.223239] audit: type=1400 audit(1570108844.890:43): avc: denied { map } for pid=7551 comm="syz-executor.1" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=28416 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 13:20:44 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=@get={0xf8, 0x13, 0x200, 0x70bd2a, 0x25dfdbfc, {{'crct10dif\x00'}, [], [], 0x400, 0x600}, [{0x8, 0x1, 0x80000000}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x5d855cc1}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004000) r2 = syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r3 = memfd_create(&(0x7f0000000540)='\x00', 0x17) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x7f94efc4d258b4e7, 0x20010, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x2000002) read$eventfd(r5, &(0x7f00000003c0), 0x8) fallocate(r3, 0xe, 0x6, 0xffffffffffff5a11) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) r8 = dup(r7) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r7) setsockopt$inet6_tcp_int(r8, 0x6, 0x12, &(0x7f0000000000)=0x6, 0x4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet(r8, &(0x7f0000000380)={0x2, 0x4e21, @empty}, 0x10) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) poll(&(0x7f0000000740)=[{r5, 0x40}, {0xffffffffffffffff, 0x2000}, {r5, 0x80}, {r7, 0x8200}, {}, {r6}, {r2}, {r4}], 0x8, 0x7fff) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:lvm_control_t:s0\x00', 0x23, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r9 = add_key(&(0x7f00000004c0)='syzkaller\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f0000000580)="03cbda9024fdf5aa818256f950d38167766f5ee316b61a5efd21a85cf40a29413b56330310bd231ab71100478bdb87363ec2f26bd6c2bfbc9460bb6923e8", 0x3e, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r9, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x800fe) sendfile(r8, r10, 0x0, 0x8000fffffffe) sendmsg$IPVS_CMD_SET_INFO(r8, &(0x7f0000000600)={&(0x7f0000000400), 0xc, &(0x7f00000005c0)={&(0x7f0000000880)=ANY=[]}, 0x1, 0x0, 0x0, 0x24044884}, 0x0) [ 175.276035] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 175.286606] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 175.326765] BTRFS error (device loop5): superblock checksum mismatch [ 175.401104] BTRFS error (device loop5): open_ctree failed [ 175.417442] audit: type=1400 audit(1570108845.070:44): avc: denied { relabelto } for pid=7562 comm="syz-executor.4" name="bus" dev="sda1" ino=16628 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 13:20:45 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x5, 0x6, 0x0, 0x2, 0x0, 0x100, 0x32746, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x81, 0x2}, 0x400, 0x8, 0x3, 0x0, 0x6, 0xbbf, 0x2}, r2, 0x10, 0xffffffffffffffff, 0x1f) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RVERSION(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x15) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r1, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@fscache='fscache'}]}}) 13:20:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0xfffffffffffffd71, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000190007041dfffd946f6105000a000300fe0200000001080008001e000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'nr0\x00', 0x1}) prctl$PR_GET_FP_MODE(0x2e) [ 175.541561] BTRFS error (device loop5): unsupported checksum algorithm 7790 13:20:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f030002000000"}, 0xff) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000140)={0x4, &(0x7f0000000000)=[{0x3, 0x4, 0xd0, 0x6}, {0x3, 0x3, 0x7, 0xbf0}, {0x80, 0x8d, 0x3, 0x634}, {0x2, 0x7f, 0x2, 0x8}]}) [ 175.591834] BTRFS error (device loop5): superblock checksum mismatch [ 175.602987] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 175.647296] audit: type=1400 audit(1570108845.090:45): avc: denied { read write } for pid=7562 comm="syz-executor.4" name="bus" dev="sda1" ino=16628 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 [ 175.683939] SELinux: failed to load policy 13:20:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10800, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x8) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000010010000010000007700000000000000f41b25e416d58937e7e899e0524843c9577f89f71ebddf077798b47ab4a76907477a209522adca7e5454b7dec9d9a67305c04a8ccffca56ccbcabfb25cc94628348a24593c6fbdf200796a8fd217367c017f76f131c8693ac43b77471be914707d2c3545b812f7f58f436706f17b26ae3208e5809f51528f2436610c52b724993141a5cb7a0a9c50ca0a16787a4d0c82e2d9829219e3d981d196f1b7256c49aac96b000000002150a4058a8e4347e13f94be6d87fc7ecdaf"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0), 0x7ab, 0x2, 0x0) [ 175.695038] SELinux: failed to load policy [ 175.714608] audit: type=1400 audit(1570108845.120:46): avc: denied { open } for pid=7562 comm="syz-executor.4" path="/root/syzkaller-testdir095680486/syzkaller.OsF4U1/26/bus" dev="sda1" ino=16628 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 [ 175.768466] audit: type=1400 audit(1570108845.380:47): avc: denied { relabelfrom } for pid=7562 comm="syz-executor.4" name="bus" dev="sda1" ino=16628 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 [ 175.800425] BTRFS error (device loop5): open_ctree failed [ 175.838643] audit: type=1400 audit(1570108845.510:48): avc: denied { getattr } for pid=6994 comm="syz-executor.4" path="/root/syzkaller-testdir095680486/syzkaller.OsF4U1/26/bus" dev="sda1" ino=16628 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 [ 175.988701] audit: type=1400 audit(1570108845.510:49): avc: denied { unlink } for pid=6994 comm="syz-executor.4" name="bus" dev="sda1" ino=16628 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 13:20:45 executing program 1: gettid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x2000}, r0, 0xb, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x100000006, 0x0, 0xfc, 0x400000050000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000014000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x2) r1 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0xc, 0x4) epoll_wait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}], 0x2, 0x7d) r2 = socket(0x0, 0x0, 0x3f) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000), 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000040)={0x80, 0x9, 0x9, 0x3, 0xb, 0x3, 0x9, 0x6, 0xfffffff7, 0x3}) 13:20:45 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/ipc\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = creat(&(0x7f0000000200)='./bus\x00', 0x0) syncfs(r6) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x30}}, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 13:20:45 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x9, &(0x7f0000000100)=[{0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000001c0)={r2}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0x47b, 0x10000}], 0x800010, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x400100, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x51a, 0x232040) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000440)=r4) ioctl$UFFDIO_WAKE(r5, 0x8010aa02, &(0x7f0000000300)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000280)=[0x1, 0x8]) recvfrom$llc(r5, &(0x7f0000000480)=""/197, 0xc5, 0x20, &(0x7f0000000580)={0x1a, 0x337, 0xfa, 0x70, 0x41, 0x8, @random="d0a202917f24"}, 0x10) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x6800) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) accept(0xffffffffffffffff, &(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000640)=0x80) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r1, 0x1}) 13:20:45 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x9, &(0x7f0000000100)=[{0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000001c0)={r2}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0x47b, 0x10000}], 0x800010, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x400100, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x51a, 0x232040) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000440)=r4) ioctl$UFFDIO_WAKE(r5, 0x8010aa02, &(0x7f0000000300)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000280)=[0x1, 0x8]) recvfrom$llc(r5, &(0x7f0000000480)=""/197, 0xc5, 0x20, &(0x7f0000000580)={0x1a, 0x337, 0xfa, 0x70, 0x41, 0x8, @random="d0a202917f24"}, 0x10) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x6800) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) accept(0xffffffffffffffff, &(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000640)=0x80) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r1, 0x1}) 13:20:45 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) prlimit64(r1, 0x81e3e20cba293f55, &(0x7f0000000280)={0x101, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) write$selinux_load(r3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r6, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000280), &(0x7f0000000580)=0x4) sched_setattr(0x0, 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x9) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @local, @empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x42}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r8, 0x4b6d, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000380)=0x22) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x400000000) [ 176.099598] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 176.126669] BTRFS error (device loop5): superblock checksum mismatch [ 176.145159] audit: type=1326 audit(1570108845.820:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7604 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c86a code=0x50000 13:20:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10800, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x8) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000010010000010000007700000000000000f41b25e416d58937e7e899e0524843c9577f89f71ebddf077798b47ab4a76907477a209522adca7e5454b7dec9d9a67305c04a8ccffca56ccbcabfb25cc94628348a24593c6fbdf200796a8fd217367c017f76f131c8693ac43b77471be914707d2c3545b812f7f58f436706f17b26ae3208e5809f51528f2436610c52b724993141a5cb7a0a9c50ca0a16787a4d0c82e2d9829219e3d981d196f1b7256c49aac96b000000002150a4058a8e4347e13f94be6d87fc7ecdaf"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0), 0x7ab, 0x2, 0x0) [ 176.203687] audit: type=1326 audit(1570108845.860:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7604 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459a29 code=0x50000 [ 176.243442] BTRFS error (device loop5): open_ctree failed [ 176.259661] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 176.296852] BTRFS error (device loop5): superblock checksum mismatch 13:20:46 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x9, &(0x7f0000000100)=[{0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000001c0)={r2}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0x47b, 0x10000}], 0x800010, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x400100, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x51a, 0x232040) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000440)=r4) ioctl$UFFDIO_WAKE(r5, 0x8010aa02, &(0x7f0000000300)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000280)=[0x1, 0x8]) recvfrom$llc(r5, &(0x7f0000000480)=""/197, 0xc5, 0x20, &(0x7f0000000580)={0x1a, 0x337, 0xfa, 0x70, 0x41, 0x8, @random="d0a202917f24"}, 0x10) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x6800) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) accept(0xffffffffffffffff, &(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000640)=0x80) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r1, 0x1}) [ 176.308136] audit: type=1326 audit(1570108845.860:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7604 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459a29 code=0x50000 13:20:46 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="024344303031", 0x6, 0xb3}], 0x0, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0xfffffffffffffffd, 0xffffffffffffff01}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000200)={0x0, 0x9, {0x57, 0x0, 0x3f32, {0x3, 0x8001}, {0xb7, 0x2}, @const={0xffe0, {0x9, 0x6, 0x5, 0x7}}}, {0x54, 0x5b, 0x9, {0x1, 0x401}, {0x6, 0x401}, @cond=[{0x162, 0x954, 0x1, 0x3, 0xf744, 0x6}, {0x8357, 0x4, 0x8000, 0x101, 0xfff, 0xf800}]}}) [ 176.400744] BTRFS error (device loop5): open_ctree failed [ 176.452639] devpts: called with bogus options [ 176.489273] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 176.498671] ISOFS: Unable to identify CD-ROM format. 13:20:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sndctrl(0x0, 0x80000000, 0x420000) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20000, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000200)) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) add_key$user(0x0, &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 176.533462] BTRFS error (device loop5): superblock checksum mismatch [ 176.572396] ISOFS: Unable to identify CD-ROM format. 13:20:46 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000580)=[&(0x7f00000003c0)='\x00', &(0x7f0000000480)='^%Gmd5sum\x00', &(0x7f00000004c0)='cgroupem1\'+GPL{wlan0\x00']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000300)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='autogroup\x00') ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x400}) syz_genetlink_get_family_id$ipvs(0x0) [ 176.590548] BTRFS error (device loop5): open_ctree failed 13:20:46 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x9, &(0x7f0000000100)=[{0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000001c0)={r2}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="8da4363ac0ed02000000000000001c4d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f", 0x47b, 0x10000}], 0x800010, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x400100, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x51a, 0x232040) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000440)=r4) ioctl$UFFDIO_WAKE(r5, 0x8010aa02, &(0x7f0000000300)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000280)=[0x1, 0x8]) recvfrom$llc(r5, &(0x7f0000000480)=""/197, 0xc5, 0x20, &(0x7f0000000580)={0x1a, 0x337, 0xfa, 0x70, 0x41, 0x8, @random="d0a202917f24"}, 0x10) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x6800) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) accept(0xffffffffffffffff, &(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000640)=0x80) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r1, 0x1}) [ 176.766572] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x26e1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000080)={0x7, 0x20, 0x7c04, 0x61c, 0x5d, 0x100}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xb000) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) [ 176.827489] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 176.835885] overlayfs: filesystem on './file0' not supported as upperdir [ 176.856218] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 176.856890] BTRFS error (device loop5): superblock checksum mismatch [ 176.910746] BTRFS error (device loop5): open_ctree failed [ 176.937021] syz-executor.3 (7656) used greatest stack depth: 23056 bytes left 13:20:47 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000580)=[&(0x7f00000003c0)='\x00', &(0x7f0000000480)='^%Gmd5sum\x00', &(0x7f00000004c0)='cgroupem1\'+GPL{wlan0\x00']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000300)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='autogroup\x00') ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x400}) syz_genetlink_get_family_id$ipvs(0x0) 13:20:47 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) prlimit64(r1, 0x81e3e20cba293f55, &(0x7f0000000280)={0x101, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) write$selinux_load(r3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r6, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000280), &(0x7f0000000580)=0x4) sched_setattr(0x0, 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x9) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @local, @empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x42}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r8, 0x4b6d, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000380)=0x22) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x400000000) 13:20:47 executing program 1: lseek(0xffffffffffffffff, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)={0x88000010}) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000000000, 0x4}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0x596, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 13:20:47 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000580)=[&(0x7f00000003c0)='\x00', &(0x7f0000000480)='^%Gmd5sum\x00', &(0x7f00000004c0)='cgroupem1\'+GPL{wlan0\x00']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000300)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) utimes(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='autogroup\x00') ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x400}) syz_genetlink_get_family_id$ipvs(0x0) 13:20:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000300)=ANY=[@ANYBLOB="240400001900212000000000d97b1806b068d6ca9b8f29c8bac3ecdf000000001c140080fe0000010000000008008a6a1a00110092545c292fed1e19141ff5371076405998144a921daa3a8c42c9e3c2763c21cf3aa4c4af946c1e84664e80290321fd8b19f1b1849d04a2259a2f8cd8fc59b8976d539574d528ac3e97a8b6d3784f9c41f07b2a4f"], 0x24}}, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000280)={0x1, 0x1, {0x3, 0x0, 0x8, 0x1, 0xa, 0x0, 0x0, 0x20, 0x1}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@empty, @in6=@remote}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f00000009c0)=0x97) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x40, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffe}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x8000) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x185) sendfile(r3, r4, 0x0, 0x8000fffffffe) fallocate(r3, 0x0, 0x9, 0x7fff) r5 = accept4$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000140)=0x1c, 0x800) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r6, 0x8000) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x8000fffffffe) fallocate(r6, 0x0, 0x9, 0x7fff) r8 = socket$inet6(0xa, 0x1, 0x8010000000000084) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="05000000", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r10}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f00000003c0)={r10, @in6={{0xa, 0x4e24, 0x0, @remote, 0x3ff}}, 0x7ff, 0x2}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r11, 0x2, 0x2fff}, &(0x7f0000000240)=0xc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='lp\x00', 0x3) r12 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r12, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0xa40}, 0x10) sendmsg$can_bcm(r12, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) sendmmsg(r12, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r13 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r13, 0x16) 13:20:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) preadv(r4, &(0x7f00000017c0), 0x0, 0x0) connect$rose(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x1, 0x1ff, r9}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r7, 0x84, 0x79, &(0x7f00000005c0)={r9, 0x4, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000002c0)={r9, @in6={{0xa, 0x4e24, 0xc3, @ipv4={[], [], @multicast2}, 0x1}}, 0x8, 0x4, 0x80000000, 0x80, 0x40}, &(0x7f00000001c0)=0x98) [ 177.779020] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 177.854988] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000110007031dfffd946fa2830002200a0007000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 13:20:47 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x61883bea5100b932, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000080)={{0x0, 0x7, 0x12000, 0x0, 0x774}}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0xa5c, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x7, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9, 0x400, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0xeb67, 0x0, 0x0, 0xf4, 0x6}, 0x0, 0x9, r3, 0xc) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x200e80, 0x14) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = fanotify_init(0x0, 0x0) fanotify_mark(r4, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) write$P9_RREAD(r1, &(0x7f00000005c0)=ANY=[@ANYPTR], 0xfe00) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000240)) close(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) r6 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) getpeername(r6, 0x0, &(0x7f0000000100)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0xb233baf347ce5c28) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000480)={0xffffffffffffffff, r3, 0x9f7, 0x63, &(0x7f0000000040)="afadd26e7504c5f39e22000b0b9b81136075d19d7e724c84e17330c2b77f599eaa454d42859a1b4ae09d7840cc7d1abca1fb636017f91eca69b09982011b18b41ab97877596225a1c1143898b8b5175ccf09dd7b3854112c49ecc0548ee15a0d70237e", 0x9439, 0x4, 0x6, 0x8, 0xfe00, 0x0, 0x3, 'syz9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe3\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x009[JB\xf7\xda\x8f\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00\x01\x00'}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x5, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 13:20:47 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000000)='u', 0x1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000001c0)={[0x4, 0x6000, 0xb000, 0x2], 0x1, 0xc8, 0x20}) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, 0x0, &(0x7f000021affc)) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x8000000511, 0x8, 0x10, 0x0, 0x1000000000000, 0xfffffffffffffffd, 0x0, 0xf026, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc01, 0x0, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x17fffd, 0x7, 0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) connect$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x1, @multicast2}}, 0x1e) r3 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r3, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x6583, @dev}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x0, 0x2000001) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r4, &(0x7f0000000080)={0x91c185628b0a42f4}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x1, 0x0) getsockopt$llc_int(r5, 0x10c, 0xc52dfb141cd01b08, &(0x7f0000000240), &(0x7f0000000280)=0x4) [ 178.351743] llc_conn_state_process: llc_conn_service failed [ 178.371703] llc_conn_state_process: llc_conn_service failed 13:20:48 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffda3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000100)={{0x67, 0x3}, 'port0\x00', 0x0, 0x20000, 0xfff, 0x9, 0x40, 0x80, 0x100, 0x0, 0x1, 0x7}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat6\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 178.409395] IPVS: ftp: loaded support on port[0] = 21 13:20:48 executing program 1: lseek(0xffffffffffffffff, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)={0x88000010}) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000000000, 0x4}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0x596, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 13:20:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) pipe(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), 0x4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x40000000000000, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0xfffffffffffffffc) clock_adjtime(0x6, &(0x7f0000000480)={0x400, 0x1, 0x200, 0x9, 0x4, 0x0, 0x8, 0x24, 0x6, 0x3, 0x5, 0xbb8, 0x80000000, 0x401, 0x1ff, 0x7fff, 0x40, 0x3b, 0x5, 0x1000, 0x3, 0x7ff, 0xff, 0xfffffffffffffff8, 0x8, 0x7ff}) fallocate(0xffffffffffffffff, 0x40, 0x0, 0x7) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f0000000380)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e21, @loopback}, 0x604, 0x0, 0x0, 0x0, 0x80, &(0x7f0000000240)='hwsim0\x00', 0x101, 0x6, 0x1}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="25707065726469723d2e2f66696c65302c6c01000080000000002e2f66696c6531"]) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000140)='./file0/f.le.\x00') renameat(r4, &(0x7f0000000180)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') [ 178.497839] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:48 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) prlimit64(r1, 0x81e3e20cba293f55, &(0x7f0000000280)={0x101, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) write$selinux_load(r3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r6, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000280), &(0x7f0000000580)=0x4) sched_setattr(0x0, 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x9) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @local, @empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x42}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r8, 0x4b6d, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000380)=0x22) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x400000000) 13:20:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) preadv(r4, &(0x7f00000017c0), 0x0, 0x0) connect$rose(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x1, 0x1ff, r9}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r7, 0x84, 0x79, &(0x7f00000005c0)={r9, 0x4, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000002c0)={r9, @in6={{0xa, 0x4e24, 0xc3, @ipv4={[], [], @multicast2}, 0x1}}, 0x8, 0x4, 0x80000000, 0x80, 0x40}, &(0x7f00000001c0)=0x98) [ 178.619905] overlayfs: unrecognized mount option "%pperdir=./file0" or missing value 13:20:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) preadv(r4, &(0x7f00000017c0), 0x0, 0x0) connect$rose(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x1, 0x1ff, r9}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r7, 0x84, 0x79, &(0x7f00000005c0)={r9, 0x4, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000002c0)={r9, @in6={{0xa, 0x4e24, 0xc3, @ipv4={[], [], @multicast2}, 0x1}}, 0x8, 0x4, 0x80000000, 0x80, 0x40}, &(0x7f00000001c0)=0x98) 13:20:48 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x61883bea5100b932, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000080)={{0x0, 0x7, 0x12000, 0x0, 0x774}}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0xa5c, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x7, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9, 0x400, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0xeb67, 0x0, 0x0, 0xf4, 0x6}, 0x0, 0x9, r3, 0xc) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x200e80, 0x14) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = fanotify_init(0x0, 0x0) fanotify_mark(r4, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) write$P9_RREAD(r1, &(0x7f00000005c0)=ANY=[@ANYPTR], 0xfe00) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000240)) close(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) r6 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) getpeername(r6, 0x0, &(0x7f0000000100)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0xb233baf347ce5c28) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000480)={0xffffffffffffffff, r3, 0x9f7, 0x63, &(0x7f0000000040)="afadd26e7504c5f39e22000b0b9b81136075d19d7e724c84e17330c2b77f599eaa454d42859a1b4ae09d7840cc7d1abca1fb636017f91eca69b09982011b18b41ab97877596225a1c1143898b8b5175ccf09dd7b3854112c49ecc0548ee15a0d70237e", 0x9439, 0x4, 0x6, 0x8, 0xfe00, 0x0, 0x3, 'syz9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe3\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x009[JB\xf7\xda\x8f\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00\x01\x00'}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x5, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) [ 179.348531] overlayfs: unrecognized mount option "%pperdir=./file0" or missing value 13:20:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000300)=ANY=[@ANYBLOB="240400001900212000000000d97b1806b068d6ca9b8f29c8bac3ecdf000000001c140080fe0000010000000008008a6a1a00110092545c292fed1e19141ff5371076405998144a921daa3a8c42c9e3c2763c21cf3aa4c4af946c1e84664e80290321fd8b19f1b1849d04a2259a2f8cd8fc59b8976d539574d528ac3e97a8b6d3784f9c41f07b2a4f"], 0x24}}, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000280)={0x1, 0x1, {0x3, 0x0, 0x8, 0x1, 0xa, 0x0, 0x0, 0x20, 0x1}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@empty, @in6=@remote}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f00000009c0)=0x97) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x40, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffe}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x8000) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x185) sendfile(r3, r4, 0x0, 0x8000fffffffe) fallocate(r3, 0x0, 0x9, 0x7fff) r5 = accept4$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000140)=0x1c, 0x800) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r6, 0x8000) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x8000fffffffe) fallocate(r6, 0x0, 0x9, 0x7fff) r8 = socket$inet6(0xa, 0x1, 0x8010000000000084) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="05000000", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r10}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f00000003c0)={r10, @in6={{0xa, 0x4e24, 0x0, @remote, 0x3ff}}, 0x7ff, 0x2}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r11, 0x2, 0x2fff}, &(0x7f0000000240)=0xc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='lp\x00', 0x3) r12 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r12, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0xa40}, 0x10) sendmsg$can_bcm(r12, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) sendmmsg(r12, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r13 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r13, 0x16) 13:20:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) preadv(r4, &(0x7f00000017c0), 0x0, 0x0) connect$rose(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x1, 0x1ff, r9}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r7, 0x84, 0x79, &(0x7f00000005c0)={r9, 0x4, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000002c0)={r9, @in6={{0xa, 0x4e24, 0xc3, @ipv4={[], [], @multicast2}, 0x1}}, 0x8, 0x4, 0x80000000, 0x80, 0x40}, &(0x7f00000001c0)=0x98) 13:20:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) preadv(r4, &(0x7f00000017c0), 0x0, 0x0) connect$rose(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x1, 0x1ff, r9}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r7, 0x84, 0x79, &(0x7f00000005c0)={r9, 0x4, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000002c0)={r9, @in6={{0xa, 0x4e24, 0xc3, @ipv4={[], [], @multicast2}, 0x1}}, 0x8, 0x4, 0x80000000, 0x80, 0x40}, &(0x7f00000001c0)=0x98) 13:20:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000002700)=[{&(0x7f0000000140)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000380)="ad", 0x1}], 0x1, &(0x7f0000000500)=[@sndrcv={0x30}, @init={0x18, 0x84, 0x0, {0x2}}], 0x48}], 0x1, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000840)=ANY=[@ANYBLOB="00007242eb2e4ac79a4c956bcdd337f87553a44c00264a2f7115a80cc38118d3b7ffbb2d6216c26abcf5eeb6c751897db5b8dfca50a6bcb901f07797f8cfe933a9292eac3fc514398918c1c9e53db733af0c18e8a37090f59f84e884f390112d3710741edd3d7cd1354d8fefd34d000263ac42baaf6bf3c0fc61fb6e5ceb22432b0e4885037524f955ee3324", @ANYRES16=r4, @ANYBLOB="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"], 0x23c}, 0x1, 0x0, 0x0, 0x40}, 0xd83a8c06b77b70ba) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x90, r4, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffff800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x869}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x8860}, 0x4000) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000040)) 13:20:50 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0400"], 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) execve(&(0x7f0000000040)='./bus\x00', &(0x7f0000000200)=[&(0x7f0000000140)='/^posix_acl_access\x00', &(0x7f00000001c0)='\x00'], &(0x7f0000000480)=[&(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='security.ima\x00', &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)='ppp1eth1trusted-\x00', &(0x7f0000000400)='security.ima\x00', &(0x7f0000000440)='@systemppp0\x00']) 13:20:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='configfs\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r0, &(0x7f00000002c0)=0x4) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="2c6c6f7700000000455aa3650c00003d2e3a1c1591f169577c206384b3424e73709e9d4beaac6215bbc72e795e4afa47a2850c55317bd80935ef8ef5369ef50f913436fd328f987ffaf7daa32bfc68af92f437"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') lstat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)) [ 180.794948] kauditd_printk_skb: 4369 callbacks suppressed [ 180.794958] audit: type=1804 audit(1570108850.470:4422): pid=7788 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir618318228/syzkaller.3h9jl1/32/bus" dev="sda1" ino=16669 res=1 13:20:50 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0), 0x492492492492565, 0x0) chdir(&(0x7f0000000200)='./file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0x3) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = creat(&(0x7f00000002c0)='./file0\x00', 0x1c1) write$P9_RRENAMEAT(r6, 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, 0x0, 0x0) r9 = request_key(&(0x7f0000000340)='big_key\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='!*system\x00', 0xfffffffffffffffb) r10 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r10, r10}, &(0x7f0000000480)=""/250, 0xfa, &(0x7f0000000580)={&(0x7f0000000080)={'wp256-generic\x00'}}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r9, &(0x7f0000000400)='.dead\x00', &(0x7f0000000440)=@keyring={'key_or_keyring:', r10}) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468000000e1170002de1300010028b60000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="5c04000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffffff0000000008000100636271003004b7d92ac7484f97166bf778f4db6f02000404060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001800010025030000000000000000000000000000000000001000050022000000000000007f00"/1106], 0x45c}}, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 13:20:50 executing program 1: acct(&(0x7f0000000040)='./file0\x00') clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) bind(r0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') exit(0x0) preadv(r1, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/151, 0x97}], 0x1, 0x0) [ 180.813066] audit: type=1400 audit(1570108850.490:4423): avc: denied { module_load } for pid=7780 comm="syz-executor.1" path="/root/syzkaller-testdir618318228/syzkaller.3h9jl1/32/bus" dev="sda1" ino=16669 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=system permissive=1 [ 180.872788] overlayfs: unrecognized mount option "low" or missing value [ 180.928284] overlayfs: unrecognized mount option "low" or missing value 13:20:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) statx(r1, &(0x7f0000000080)='./file0\x00', 0x400, 0x80, &(0x7f0000000540)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x1f8, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000004c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x70}, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[]}}, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x6]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) ioctl$KVM_NMI(r3, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r5 = dup(r4) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r6, 0x4b6d, 0x0) write$apparmor_exec(r6, &(0x7f0000000180)={'exec ', 'cpuacct.stat\x00'}, 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000900)={[0x7fd, 0x5, 0x0, 0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd], 0x2800}) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f00000001c0)=@urb_type_bulk={0x3, {0x7, 0x1}, 0x8002, 0x6, &(0x7f0000000780)="56bf099b1b924554932574486ec7491f95c415cc5ed99b437e48048a5c4cadf8470d599f6533105a4181cc7d6b2cc189eea0cc7086bc193ef5762be9f7ffeba2a345c3859556c9486de493e2ec38e63ee2e7e9cd01efb93166cec463d8fa4957f4fab48febf094fc12b807380719068d5f157c2e53b395d6eeedbf33472cb8af17996e2b24b304728367dd26ffbe1d92cb6f9006e0772df7d0575e5abf86f8d720eda3bebc4af3be8c870cf4efd16fcea610be", 0xb3, 0x1, 0x0, 0x8, 0x4, 0x9, &(0x7f0000000840)="133bd7766ee21e6e25a65dcb80cfbdce760519819b6c113c476e5a2a8bc79f9fe693b7701a0caf584ec946e21794c779467c402dad6e7e1b87b7b098c155e57c1e8073502783cba5db742e05116b98c652ffe9df88cea7d7812b0aaa832f0c3bb38d2344d83407bc35a4334d6f0b807a70eb0f34b1e860ec88810884307565d13a50f37a6fd8708cd5ecefd45e608ce1309fd2748eeb5e3ae79deac4245ee504266a3cb7cf95f90cc2462dfe0b5a786caa11bca0653584bd1cc20629c27351"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 181.167838] devpts: called with bogus options 13:20:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0xe1) [ 181.208919] audit: type=1804 audit(1570108850.540:4424): pid=7788 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir618318228/syzkaller.3h9jl1/32/bus" dev="sda1" ino=16669 res=1 13:20:50 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x4000, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000180)=0x7, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x1b\x00', &(0x7f00000000c0)=@md5={0x1, "8f874eccbc16c63f31f158158c683d8e"}, 0x11, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x2e, 0x3ff, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x70) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x70bd26, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r6, {}, {}, {0x3}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x18, 0x2, [@TCA_BPF_OPS={{0x8, 0x4, 0x1}, {0xc, 0x5, [{0x8d}]}}]}}]}, 0x44}}, 0x0) connect$can_bcm(r1, &(0x7f00000001c0)={0x1d, r6}, 0x10) 13:20:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009040)=[{{0x0, 0x0, &(0x7f0000004580)=[{&(0x7f0000004480)=""/245, 0xf5}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0xff, @multicast1, 0x4e23, 0x1, 'lblc\x00', 0x2, 0x5, 0x3}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000000280), 0x1c) [ 181.335585] audit: type=1804 audit(1570108850.570:4425): pid=7789 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir095680486/syzkaller.OsF4U1/29/bus" dev="sda1" ino=16671 res=1 13:20:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x0, 0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) connect$ax25(0xffffffffffffffff, &(0x7f0000000240)={{0x3, @bcast}, [@bcast, @bcast, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') pivot_root(&(0x7f0000000340)='./file2\x00', 0x0) socket$caif_stream(0x25, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="000010200000c20419018304010801070000e063cbf631ca0b41c9b977fa"], 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000fc752f792aa20b3dc2e2aca5ae3dbfb07d36530e5ff1dac716bf15b582"], 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000380)=[{&(0x7f0000000d80)=""/4096, 0x1000}], 0x1, &(0x7f00000003c0)=""/115, 0x73}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000000b80)=""/47, 0x2f}, {&(0x7f0000000bc0)=""/90, 0x5a}, {0x0}], 0x3, &(0x7f0000002e00)=""/178, 0xb2}}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000004440)=""/2, 0x2}}, {{&(0x7f0000006940)=@alg, 0x80, &(0x7f0000006dc0)=[{&(0x7f00000069c0)=""/160, 0xa0}, {&(0x7f0000006a80)=""/36, 0x24}, {&(0x7f0000006b40)=""/202, 0xca}, {0x0}, {0x0}, {&(0x7f0000006d00)=""/179, 0xb3}], 0x6}, 0xfffffffffffffffd}, {{0x0, 0x0, &(0x7f0000007500)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x7, 0x1, &(0x7f0000008b40)) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') listxattr(&(0x7f0000000200)='./file2/file0\x00', &(0x7f0000000440)=""/14, 0xe) setxattr$security_ima(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.ima\x00', &(0x7f0000007580)=@v2={0x0, 0x0, 0x1, 0x6e27, 0xc40, "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"}, 0xc4a, 0x2) [ 181.384571] audit: type=1804 audit(1570108850.590:4426): pid=7789 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir095680486/syzkaller.OsF4U1/29/bus" dev="sda1" ino=16671 res=1 [ 181.447372] audit: type=1804 audit(1570108850.600:4427): pid=7789 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir095680486/syzkaller.OsF4U1/29/bus" dev="sda1" ino=16671 res=1 13:20:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='loginuid\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000181, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000340)={'broute\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000000)=[{}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000140)=ANY=[@ANYBLOB="080000000002090000000500000000000000079a11fe9fefffffffe3010000003309a9f030b39c96ac56d93bc162a762870938044b6a64975948b4da5f583da0271e14ca7bcb9c554cae7ad5b83b9167ee1ea47c969c220f11165c24b056b7f494641f65b42fa1bb40dde0a5b4b88a836a94b8ab7f29fbd0050000000000000051d919b6347e3fba672aecb103a9ef4127c2c838330ef7b6e6978add6091df67da7642bac19503dd48c62eb968a7ed1df08ab3a40f4a54c072a88c83ac32c7c1c6b582f302318a8052b7994b344b4c7a28f1b979d075017bbc8092e6f8880c8c2c4d45b928c1fb2954f6d68770f4ada637f2b017e19134f702587c50398b08e8eb52d534da9bdffb048b294226dff42bb93331b51ee20e3afcd5612c7518a8ccc9db6f4f1e414355f68e3d3f08"]) 13:20:51 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth0_to_team\x00', &(0x7f0000000100)=@ethtool_cmd={0x26, 0x100}}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000180)="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") select(0x40, &(0x7f0000000000)={0x40, 0x3a6, 0x4, 0x6, 0x0, 0x6b26ff35, 0x800, 0x10001}, &(0x7f0000000040)={0x100000001, 0x3, 0x7, 0x4, 0x7fff, 0x3, 0x6ed3, 0x4}, &(0x7f0000000080)={0x3, 0x4, 0x6, 0xf23, 0x7, 0x5, 0x0, 0x2}, &(0x7f0000000140)={0x77359400}) 13:20:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009040)=[{{0x0, 0x0, &(0x7f0000004580)=[{&(0x7f0000004480)=""/245, 0xf5}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0xff, @multicast1, 0x4e23, 0x1, 'lblc\x00', 0x2, 0x5, 0x3}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000000280), 0x1c) 13:20:51 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x4000, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000180)=0x7, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x1b\x00', &(0x7f00000000c0)=@md5={0x1, "8f874eccbc16c63f31f158158c683d8e"}, 0x11, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x2e, 0x3ff, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x70) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x70bd26, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@newtfilter={0x44, 0x2c, 0x701, 0x0, 0x0, {0x0, r6, {}, {}, {0x3}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x18, 0x2, [@TCA_BPF_OPS={{0x8, 0x4, 0x1}, {0xc, 0x5, [{0x8d}]}}]}}]}, 0x44}}, 0x0) connect$can_bcm(r1, &(0x7f00000001c0)={0x1d, r6}, 0x10) 13:20:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40505330, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getresuid(0x0, 0x0, 0x0) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)) getresuid(0x0, &(0x7f00000001c0), 0x0) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(r1, 0x0) getresuid(&(0x7f0000000140), &(0x7f00000001c0), 0x0) socket$inet(0x2, 0x6000000000000001, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000080)={0x4, "9dca50784274d08abbb1fcd26d90a7ee5176258bac03b932ee94abb540d9629b"}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vcan0\x00'}) syz_open_procfs(0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x200488f4, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffc, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe84) sendmmsg$sock(r2, &(0x7f0000001b80)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000580)='A', 0x1}], 0x1}}], 0x15, 0x4000000) close(r2) 13:20:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x0, 0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) connect$ax25(0xffffffffffffffff, &(0x7f0000000240)={{0x3, @bcast}, [@bcast, @bcast, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') pivot_root(&(0x7f0000000340)='./file2\x00', 0x0) socket$caif_stream(0x25, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="000010200000c20419018304010801070000e063cbf631ca0b41c9b977fa"], 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000fc752f792aa20b3dc2e2aca5ae3dbfb07d36530e5ff1dac716bf15b582"], 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000380)=[{&(0x7f0000000d80)=""/4096, 0x1000}], 0x1, &(0x7f00000003c0)=""/115, 0x73}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000000b80)=""/47, 0x2f}, {&(0x7f0000000bc0)=""/90, 0x5a}, {0x0}], 0x3, &(0x7f0000002e00)=""/178, 0xb2}}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000004440)=""/2, 0x2}}, {{&(0x7f0000006940)=@alg, 0x80, &(0x7f0000006dc0)=[{&(0x7f00000069c0)=""/160, 0xa0}, {&(0x7f0000006a80)=""/36, 0x24}, {&(0x7f0000006b40)=""/202, 0xca}, {0x0}, {0x0}, {&(0x7f0000006d00)=""/179, 0xb3}], 0x6}, 0xfffffffffffffffd}, {{0x0, 0x0, &(0x7f0000007500)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x7, 0x1, &(0x7f0000008b40)) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') listxattr(&(0x7f0000000200)='./file2/file0\x00', &(0x7f0000000440)=""/14, 0xe) setxattr$security_ima(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.ima\x00', &(0x7f0000007580)=@v2={0x0, 0x0, 0x1, 0x6e27, 0xc40, "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"}, 0xc4a, 0x2) 13:20:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='loginuid\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000181, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000340)={'broute\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000000)=[{}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 13:20:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009040)=[{{0x0, 0x0, &(0x7f0000004580)=[{&(0x7f0000004480)=""/245, 0xf5}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0xff, @multicast1, 0x4e23, 0x1, 'lblc\x00', 0x2, 0x5, 0x3}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000000280), 0x1c) 13:20:51 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x226, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x1) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7ff) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}], 0x1, 0x600) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="757366a2c27f766cbd8b5678e077fcecafe30af31db0f4a6b9e46b03ba02e12887b0d0af4bc3ba01eda86a646d0959e8ab19f6a4d8b9b83eed964b5f14491bb8dc00c455cc21af3fa22e5d5d131f00"/102]) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video1\x00', 0x2, 0x0) recvfrom$x25(r3, &(0x7f0000000380)=""/55, 0x37, 0x2, &(0x7f00000003c0)={0x9, @remote={[], 0x1}}, 0x12) write$P9_RVERSION(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x15) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@const={0xe, 0x0, 0x0, 0xa, 0x2}, @restrict={0x1, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x8, 0x2e, 0x5f]}}, &(0x7f0000000780)=""/74, 0x35, 0x4a, 0x1}, 0x20) write$P9_RAUTH(r2, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r2, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x2, 0x4) request_key(&(0x7f0000000400)='trusted\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)='\x00', 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xb) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x300, 0x0) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x2000, 0x0) readlink(&(0x7f00000002c0)='./file0\x00', &(0x7f00000006c0)=""/126, 0x7e) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) 13:20:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007b00)=[{{&(0x7f00000026c0)=@hci, 0x80, 0x0}, 0x49bf}, {{&(0x7f0000002780)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000002940)=[{0x0}, {&(0x7f0000002840)=""/143, 0x8f}, {&(0x7f0000002900)=""/24, 0x18}], 0x3, &(0x7f0000002980)=""/97, 0x61}, 0x4}, {{&(0x7f0000002d00)=@x25={0x9, @remote}, 0x80, &(0x7f0000003080)=[{0x0}, {&(0x7f0000002dc0)=""/235, 0xeb}, {&(0x7f0000002ec0)=""/13, 0xd}, {0x0}], 0x4}}, {{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000003280)=""/117, 0x75}, {&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/207, 0xcf}, {&(0x7f0000004400)}], 0x4, &(0x7f00000044c0)}, 0x3}, {{0x0, 0x0, &(0x7f00000076c0)=[{0x0}, {&(0x7f0000007400)=""/20, 0x14}, {0x0}], 0x3}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000007a40)=""/132, 0x84}, 0x2}], 0x6, 0x2060, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x5, 0x8, 0x32, 0x12d7}) recvmmsg(r2, &(0x7f0000001280), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}) 13:20:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4) open(0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$getflags(r0, 0x0) accept4$tipc(r0, &(0x7f0000000700), &(0x7f0000000740)=0x10, 0x0) getegid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), 0x0) getpgrp(0x0) getuid() fstat(0xffffffffffffffff, &(0x7f00000017c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001880)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001900)) gettid() sendmmsg$unix(r0, 0x0, 0x0, 0x0) getgroups(0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) 13:20:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009040)=[{{0x0, 0x0, &(0x7f0000004580)=[{&(0x7f0000004480)=""/245, 0xf5}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0xff, @multicast1, 0x4e23, 0x1, 'lblc\x00', 0x2, 0x5, 0x3}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000000280), 0x1c) 13:20:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007b00)=[{{&(0x7f00000026c0)=@hci, 0x80, 0x0}, 0x49bf}, {{&(0x7f0000002780)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000002940)=[{0x0}, {&(0x7f0000002840)=""/143, 0x8f}, {&(0x7f0000002900)=""/24, 0x18}], 0x3, &(0x7f0000002980)=""/97, 0x61}, 0x4}, {{&(0x7f0000002d00)=@x25={0x9, @remote}, 0x80, &(0x7f0000003080)=[{0x0}, {&(0x7f0000002dc0)=""/235, 0xeb}, {&(0x7f0000002ec0)=""/13, 0xd}, {0x0}], 0x4}}, {{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000003280)=""/117, 0x75}, {&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/207, 0xcf}, {&(0x7f0000004400)}], 0x4, &(0x7f00000044c0)}, 0x3}, {{0x0, 0x0, &(0x7f00000076c0)=[{0x0}, {&(0x7f0000007400)=""/20, 0x14}, {0x0}], 0x3}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000007a40)=""/132, 0x84}, 0x2}], 0x6, 0x2060, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x5, 0x8, 0x32, 0x12d7}) recvmmsg(r2, &(0x7f0000001280), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}) 13:20:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(r0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) socket$inet6(0xa, 0x3, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f00000003c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x4, 0xfdd5054037074772) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000240)='./bus\x00', r5}, 0x10) geteuid() openat$cgroup_int(r5, &(0x7f0000000400)='rdma.max\x00', 0x2, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000280)=0x8) r6 = add_key(&(0x7f0000000300)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000240)="01", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r6, 0xee00, 0x0) r7 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$read(0xb, r7, &(0x7f00000004c0)=""/156, 0x9c) 13:20:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) recvfrom(0xffffffffffffffff, &(0x7f00000001c0)=""/247, 0xf7, 0x41, &(0x7f0000000000)=@ethernet={0x1, @broadcast}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6fc2d42c8969fbb25ef5f3a830286c7c376e005510c8f761febb18d3576820e38b52f760d61131593c75af1da3786447ee20ebc155deee8fad46902d59695ffd4f37dcdd64958bc8a47d939926ef5d1ba04bffefb8cee31df910be582d680b48dbf37c34da979f4756ddfd6961969c46aabb3d5a5fe08fce842299d795f9a62014de8a76d74ec69e80bc97c19abedaf706fab51cc2da6cbe50de60020509128fe5ab7ba37bb2ea0dd52d23c8576833793afad59585369a2b016eb55dbf17d8018ba61d2bfd4fc93c493af3d3718f20ee0aeabe9a445e90ea080155280f3a30cadb9257"]) [ 182.296849] list_add double add: new=ffff888059318f58, prev=ffff888059318f58, next=ffff888092052840. [ 182.306827] ------------[ cut here ]------------ [ 182.311602] kernel BUG at lib/list_debug.c:29! [ 182.316249] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 182.317539] PM: Basic memory bitmaps freed [ 182.321605] Modules linked in: [ 182.321620] CPU: 0 PID: 7902 Comm: syz-executor.3 Not tainted 4.14.146 #0 [ 182.321626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.321632] task: ffff888080362480 task.stack: ffff888059f38000 [ 182.321648] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 182.321653] RSP: 0018:ffff888059f3fa00 EFLAGS: 00010282 [ 182.321661] RAX: 0000000000000058 RBX: ffff888092052800 RCX: 0000000000000000 [ 182.321667] RDX: 0000000000011e9e RSI: ffffffff814b2e55 RDI: ffffed100b3e7f36 [ 182.321673] RBP: ffff888059f3fa18 R08: 0000000000000058 R09: ffff888080362d48 [ 182.321678] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888092052840 [ 182.321683] R13: ffff888059318f58 R14: ffff888059318f58 R15: ffff888059318f58 [ 182.321692] FS: 00007f20d1557700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 182.352537] kobject: 'loop4' (ffff8880a4acea20): kobject_uevent_env [ 182.356580] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 182.356585] CR2: 00007f4c1aa06518 CR3: 0000000073b9d000 CR4: 00000000001406f0 [ 182.356593] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 182.356596] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 182.356602] Call Trace: [ 182.372957] kobject: 'loop4' (ffff8880a4acea20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 182.376487] ? _raw_spin_lock+0x37/0x40 [ 182.376499] p9_fd_request+0xe3/0x2b0 [ 182.376513] p9_client_rpc+0x21b/0x1180 [ 182.391632] kobject: 'loop2' (ffff8880a4a3e0a0): kobject_uevent_env [ 182.398307] ? p9_client_prepare_req.part.0+0xa90/0xa90 [ 182.398317] ? trace_hardirqs_on_caller+0x400/0x590 [ 182.398327] ? trace_hardirqs_on+0xd/0x10 [ 182.407942] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 182.412971] ? finish_wait+0x260/0x260 [ 182.412981] ? destroy_inode+0xc7/0x120 [ 182.412987] ? evict+0x3e6/0x630 [ 182.412999] p9_client_clunk+0x89/0x150 [ 182.413010] v9fs_dentry_release+0x6d/0xd0 [ 182.413017] ? v9fs_cached_dentry_delete+0x40/0x40 [ 182.413033] __dentry_kill+0x39a/0x580 [ 182.419181] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 182.426166] ? dput.part.0+0x2a/0x750 [ 182.426175] ? dput.part.0+0x2a/0x750 [ 182.426182] dput.part.0+0x59f/0x750 [ 182.426191] do_one_tree+0x44/0x50 [ 182.426200] shrink_dcache_for_umount+0x67/0x140 13:20:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='loginuid\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000181, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000340)={'broute\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000000)=[{}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 13:20:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009040)=[{{0x0, 0x0, &(0x7f0000004580)=[{&(0x7f0000004480)=""/245, 0xf5}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0xff, @multicast1, 0x4e23, 0x1, 'lblc\x00', 0x2, 0x5, 0x3}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) 13:20:52 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="8105", 0x2}], 0x1}, 0x20008000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000180)={0x2, &(0x7f0000000380)=[{}, {}]}) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000280)=@nl=@unspec, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="88e77e406201", 0x6}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 182.426209] generic_shutdown_super+0x6d/0x370 [ 182.426222] kill_anon_super+0x3f/0x60 [ 182.434417] kobject: 'loop0' (ffff8880a4950620): kobject_uevent_env [ 182.440750] v9fs_kill_super+0x3e/0xa0 [ 182.440760] deactivate_locked_super+0x74/0xe0 [ 182.440767] deactivate_super+0x85/0xa0 [ 182.440776] cleanup_mnt+0xb2/0x150 [ 182.440782] __cleanup_mnt+0x16/0x20 [ 182.440794] task_work_run+0x114/0x190 [ 182.443677] kobject: 'loop2' (ffff8880a4a3e0a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 182.452828] exit_to_usermode_loop+0x1da/0x220 [ 182.452839] do_syscall_64+0x4bc/0x640 [ 182.452846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 182.452859] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 182.452866] RIP: 0033:0x459a29 [ 182.452870] RSP: 002b:00007f20d1556c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 182.452882] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000459a29 [ 182.456982] kobject: 'loop0' (ffff8880a4950620): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 182.460630] RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000020000140 [ 182.460635] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 182.460641] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20d15576d4 [ 182.460646] R13: 00000000004c9427 R14: 00000000004e0ae0 R15: 00000000ffffffff [ 182.460654] Code: e9 56 ff ff ff 4c 89 [ 182.471877] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 182.476402] e1 48 c7 c7 80 30 9d 86 e8 4f a8 72 fe 0f [ 182.486183] FAT-fs (loop2): Unrecognized mount option "noÂÔ" or missing value [ 182.491803] 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 c0 31 9d 86 e8 38 a8 72 fe <0f> 0b 48 89 f1 [ 182.525238] PM: Basic memory bitmaps created [ 182.526217] 48 c7 c7 40 31 9d 86 4c 89 e6 e8 24 a8 72 fe 0f [ 182.542561] PM: Basic memory bitmaps freed [ 182.545881] RIP: __list_add_valid.cold+0x26/0x3c RSP: ffff888059f3fa00 [ 182.545933] ---[ end trace 9e555058815f35da ]--- [ 182.589099] kobject: 'loop0' (ffff8880a4950620): kobject_uevent_env [ 182.594308] Kernel panic - not syncing: Fatal exception [ 182.595742] Kernel Offset: disabled [ 182.743739] Rebooting in 86400 seconds..