[ 30.406903] kauditd_printk_skb: 9 callbacks suppressed [ 30.406910] audit: type=1800 audit(1560932396.619:33): pid=6825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 30.440166] audit: type=1800 audit(1560932396.619:34): pid=6825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 51.079887] random: sshd: uninitialized urandom read (32 bytes read) [ 51.525687] audit: type=1400 audit(1560932417.739:35): avc: denied { map } for pid=7000 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 51.606030] random: sshd: uninitialized urandom read (32 bytes read) [ 52.257284] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.1.43' (ECDSA) to the list of known hosts. [ 58.204415] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/19 08:20:24 fuzzer started [ 58.396049] audit: type=1400 audit(1560932424.609:36): avc: denied { map } for pid=7009 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 60.165766] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/19 08:20:27 dialing manager at 10.128.0.105:36079 2019/06/19 08:20:27 syscalls: 2444 2019/06/19 08:20:27 code coverage: enabled 2019/06/19 08:20:27 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/19 08:20:27 extra coverage: extra coverage is not supported by the kernel 2019/06/19 08:20:27 setuid sandbox: enabled 2019/06/19 08:20:27 namespace sandbox: enabled 2019/06/19 08:20:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/19 08:20:27 fault injection: enabled 2019/06/19 08:20:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/19 08:20:27 net packet injection: enabled 2019/06/19 08:20:27 net device setup: enabled [ 62.196060] random: crng init done 08:21:46 executing program 2: 08:21:46 executing program 5: 08:21:46 executing program 3: 08:21:46 executing program 0: 08:21:46 executing program 4: 08:21:46 executing program 1: [ 140.157354] audit: type=1400 audit(1560932506.369:37): avc: denied { map } for pid=7027 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13766 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 140.353598] IPVS: ftp: loaded support on port[0] = 21 [ 140.633320] chnl_net:caif_netlink_parms(): no params data found [ 140.664499] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.671601] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.678508] device bridge_slave_0 entered promiscuous mode [ 140.686085] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.692594] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.699393] device bridge_slave_1 entered promiscuous mode [ 140.714360] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 140.723180] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 140.738456] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 140.745771] team0: Port device team_slave_0 added [ 140.751851] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 140.758847] team0: Port device team_slave_1 added [ 140.764159] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 140.771563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 140.800920] IPVS: ftp: loaded support on port[0] = 21 [ 140.831822] device hsr_slave_0 entered promiscuous mode [ 140.900425] device hsr_slave_1 entered promiscuous mode [ 140.940637] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 140.956502] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 140.994280] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.000769] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.007704] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.014195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.053502] IPVS: ftp: loaded support on port[0] = 21 [ 141.079546] chnl_net:caif_netlink_parms(): no params data found [ 141.156393] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.163112] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.170370] device bridge_slave_0 entered promiscuous mode [ 141.178280] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.185757] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.192986] device bridge_slave_1 entered promiscuous mode [ 141.199005] IPVS: ftp: loaded support on port[0] = 21 [ 141.220776] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 141.226832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 141.242838] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.256263] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.267274] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 141.298430] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 141.307947] team0: Port device team_slave_0 added [ 141.325723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.334361] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.341501] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.353593] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 141.359676] 8021q: adding VLAN 0 to HW filter on device team0 [ 141.366596] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 141.374233] team0: Port device team_slave_1 added [ 141.388488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 141.398460] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 141.405581] chnl_net:caif_netlink_parms(): no params data found [ 141.493219] device hsr_slave_0 entered promiscuous mode [ 141.560356] device hsr_slave_1 entered promiscuous mode [ 141.603833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.611605] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.618031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.627989] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 141.635747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 141.643615] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 141.651973] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 141.664174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 141.672631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.680638] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.686973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.712693] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.719117] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.727073] device bridge_slave_0 entered promiscuous mode [ 141.736137] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.742584] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.749389] device bridge_slave_1 entered promiscuous mode [ 141.768824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 141.784963] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.792773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 141.804751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 141.814764] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.823535] IPVS: ftp: loaded support on port[0] = 21 [ 141.823582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 141.849216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 141.881347] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 141.904423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 141.912282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 141.920193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 141.928330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 141.941631] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 141.948803] team0: Port device team_slave_0 added [ 141.955506] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 141.962773] team0: Port device team_slave_1 added [ 141.971995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 141.979603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 141.997520] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 142.006170] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 142.013374] chnl_net:caif_netlink_parms(): no params data found [ 142.028778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 142.053866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 142.062356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.083547] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 142.109834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 142.117594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.125597] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 142.131822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 142.153329] IPVS: ftp: loaded support on port[0] = 21 [ 142.164491] device hsr_slave_0 entered promiscuous mode [ 142.200419] device hsr_slave_1 entered promiscuous mode [ 142.275026] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 142.304420] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 142.315211] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 142.335932] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.342392] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.349235] device bridge_slave_0 entered promiscuous mode [ 142.358730] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.365190] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.372554] device bridge_slave_1 entered promiscuous mode [ 142.394598] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 142.435239] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.447076] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.467106] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 142.505104] chnl_net:caif_netlink_parms(): no params data found [ 142.535253] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.544147] team0: Port device team_slave_0 added [ 142.553160] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 142.560814] team0: Port device team_slave_1 added [ 142.566682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 08:21:48 executing program 2: [ 142.615979] 8021q: adding VLAN 0 to HW filter on device bond0 [ 142.629601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 142.654584] bridge0: port 1(bridge_slave_0) entered blocking state 08:21:48 executing program 2: 08:21:48 executing program 2: [ 142.661772] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.668861] device bridge_slave_0 entered promiscuous mode [ 142.705703] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 08:21:48 executing program 2: 08:21:48 executing program 2: 08:21:49 executing program 2: [ 142.727849] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.745493] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.760857] device bridge_slave_1 entered promiscuous mode 08:21:49 executing program 2: [ 142.823640] device hsr_slave_0 entered promiscuous mode [ 142.844446] device hsr_slave_1 entered promiscuous mode [ 142.862740] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 142.869895] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 142.884643] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.893800] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.902572] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 142.912377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.919229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.927406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 142.956967] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 142.963388] 8021q: adding VLAN 0 to HW filter on device team0 [ 142.973388] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 142.980892] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.989818] team0: Port device team_slave_0 added [ 143.009279] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 143.017678] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.024979] team0: Port device team_slave_1 added [ 143.045886] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 143.053143] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 143.062984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 143.071428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.079202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.088000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.094905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.102805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.110866] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.117211] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.124270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.132176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.140540] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.146890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.160856] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 143.166932] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.174401] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 143.195167] chnl_net:caif_netlink_parms(): no params data found [ 143.208853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.218146] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 143.232142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 143.246858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.254972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.262602] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.268922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.276176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 143.334625] device hsr_slave_0 entered promiscuous mode [ 143.370520] device hsr_slave_1 entered promiscuous mode [ 143.410758] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 143.418069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.426796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 143.442919] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 143.451541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 143.470793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 143.478480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.486361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.494099] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.500494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.509952] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 143.548496] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.555321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.565187] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.573394] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.581995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 143.591404] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 143.597784] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.604462] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.612230] device bridge_slave_0 entered promiscuous mode [ 143.620972] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 143.627136] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.633975] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.643819] device bridge_slave_1 entered promiscuous mode [ 143.649861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 143.659573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 143.672043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 143.696195] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 143.704588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.712574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.720245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.727669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.744858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 143.756020] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 143.765282] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 143.772923] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 143.786224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.794174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.802201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.809069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.816191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 143.825883] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 143.832263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 143.856575] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 143.862854] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.869299] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.876733] team0: Port device team_slave_0 added [ 143.883511] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.891388] team0: Port device team_slave_1 added [ 143.902278] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.911279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 143.924155] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 143.933082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 143.941380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.949144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.956956] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.963384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.970633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.978290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.986254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.009883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 144.018358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.025895] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 144.034254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 144.042352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 144.051475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 144.067655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 144.079417] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 144.091024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.099267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.107569] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.113997] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.121655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.129193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.139067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 144.182176] device hsr_slave_0 entered promiscuous mode [ 144.210487] device hsr_slave_1 entered promiscuous mode [ 144.253724] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 144.262562] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 144.275567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 144.285106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 144.293205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.302933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 144.311983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 144.319991] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 144.328412] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 144.334702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 144.344710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.361226] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 144.373649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 144.384956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 144.394887] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 144.406687] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 144.414218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 144.422463] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 144.430416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 144.438123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 144.446411] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 144.458141] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 144.473209] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 144.479889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.488025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.495510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.502897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.521170] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 144.529155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 144.552717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 144.564559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.573382] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 144.579454] 8021q: adding VLAN 0 to HW filter on device team0 [ 144.588775] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 144.597878] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 144.604570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 144.611721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.619461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.627216] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.633562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.641789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.651306] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 144.668021] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 144.676007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.684880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.692941] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.699333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.707634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 144.723439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.730915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 144.743372] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 144.753244] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 144.765763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 144.775682] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 144.795750] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 144.816993] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 144.826386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.839371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.846505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 144.854680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 144.862299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 144.871817] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 144.877901] 8021q: adding VLAN 0 to HW filter on device team0 [ 144.889352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 144.897144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 144.909122] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 144.920540] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 144.928168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 144.938607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.947549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.955136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.963153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.970829] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.977185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.986380] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 144.995956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 145.003108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.013025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.020582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.027890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.036639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.044564] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.050990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.059705] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 145.067330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 145.089374] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 145.097694] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 145.117587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 145.134144] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 145.141299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.149235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 145.162243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 145.169601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.178999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 145.186919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.197072] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 145.208586] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 145.215432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.223160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.231794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.239153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.252728] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 145.259543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.267753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.278915] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 145.285541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 145.301129] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 145.310960] 8021q: adding VLAN 0 to HW filter on device batadv0 08:21:52 executing program 5: r0 = add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000002400)={'syz'}, &(0x7f0000002440)="e4", 0x1, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000002540)='\x00', 0x0) 08:21:52 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, r0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) getpgid(0x0) 08:21:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'dummy0\x00', 0x1}, 0x18) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfec7be070") connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x8000}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) recvfrom$unix(r1, &(0x7f0000000100)=""/9, 0x9, 0x40000141, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) bind$unix(r1, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) connect$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0x2711}, 0x10) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000140)=0x10cf) sendmmsg(r0, &(0x7f0000000040), 0x0, 0x40) 08:21:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x800000000203) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 08:21:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) 08:21:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4000000000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000803, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00\x02\x00', 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0x3) sendto(r0, &(0x7f0000000200)="ba74851b9db8eb3c00000000000800000100a6d3dee4f29dc0aa100855f6a261", 0x20, 0x4000, 0x0, 0x0) 08:21:52 executing program 5: r0 = add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000002400)={'syz'}, &(0x7f0000002440)="e4", 0x1, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000002540)='\x00', 0x0) 08:21:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, 0x0, 0x0, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x13102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) r1 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 146.416688] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 08:21:52 executing program 3: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 08:21:52 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 08:21:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'team_slave_0\x00', 0x4}, 0x18) r1 = gettid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/240, 0xf0}, 0x2}, {{&(0x7f00000005c0)=@pppol2tpv3, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/245, 0xf5}, {&(0x7f0000000740)=""/15, 0xf}, {0x0}], 0x3, &(0x7f0000000800)=""/58, 0x3a}, 0x5}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000004440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000004640)=[{&(0x7f0000004540)=""/213, 0xd5}], 0x1}, 0x1000}], 0x4, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x80000) ptrace$cont(0x4204, r1, 0x202, 0xa05000) 08:21:52 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) close(r0) 08:21:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x800000000203) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 08:21:52 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="116348400000000000000000000000000000008c1f0d7cb89bea5b0dc6000000000000000000000600000000000068bb26cda0f40974d78ed01688dd3af61bc0770b83df2387b8b849eb99ae"], 0x0, 0x0, 0x0}) [ 146.614172] hrtimer: interrupt took 40020 ns 08:21:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='oom_score\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 08:21:52 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 08:21:52 executing program 0: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x5) r1 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000500)='\'\x00', 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) add_key(0x0, 0x0, &(0x7f00000002c0)="9e0f7eb54e0cf3a5beb99411025f2551150bfaa7ca1483fd152e6ad22ce12f3b4db243d4df22afde70a116b2c0943eb40e8101d2e9bb84a2c5c49d6f5e82098b7ef30217dc3417ce093c344bee30673eadb6a250aff8d7543bcce81d33e2df5b099f4013c89946cab9c739f8c1e97b5f06cf", 0x72, 0xfffffffffffffffc) request_key(&(0x7f0000000640)='\x9a\x9dNMuA\xffM\xf4\xc0\xe0JNq\xe5\xb5\"4\xd7? \x8f\xc2\x95\xdd\x88s\xbf\xc0Q\x7f!\x8b\x00xH\xadF\xdb\xe2\xc9\x96\xde9\xdf\x96\xb6\xb0\xd5\"c#\xb5\x9e5\xfdX\xe7Z\nzz\x82\xbe\xff]\xe0Ik9\x19\xf5\xbcf\xfbA88\x8d\x14\x98\xbfr~\xcd#\x0f&\xbb\xcd,\x9a\x02\xd5j\x99\xc0F$P\x1d\x90\xa5\x82\x7fPS\x1ey\xd9hrv^\xc4([C\xa0a\x9e\x10y\xf1\x91\xcbG\xefL\xaf\x14t\xd1Ar\xdf\xcc?\xba:8\x1e0\x9a2-\x15\xb8\x1c\x01\xd1\x80\xc1\\\xa0u\xa0NG\x10\x99%\x8f\xa9\xc1\n\xdc\xf8Y\xcd`\x8d\xf8\xe2\r\x16\xd0\n!\xc6\x92ca\xe5\x15\x92U];\xf8\xd8\xa5\xd1\x1f\x99)8\xc9\xf0G\xc1em\rh\xf1\xae\xe1bP\x04\xee\xdc\x87r\xf5x3\xa3+\xe9\xe3\xbf*\xdb\x9f\xa9\xe7\t\xcf\xc3\x04CQ\n(Px\x0e\xa0LE\xd1oi\x1c\xd5:\xf8\xa7Z5fo|\xbd\x84\x95\x90\x9cn\xc1U:*\xc0\xeaA\xbcR>\xad\x06P|}\t\xe5A\xc8N4\xf5\xc2\xf7\x7fO\b3\xe41\x94\xa6\xd2\xbc[\xdc\xc8j\xce\x06\xee', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000280)=')\x00', 0xfffffffffffffffc) read$eventfd(r3, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x13f, 0x0, 0x0, 0xb2) ioctl$BLKIOMIN(r2, 0x1278, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='.\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f00000003c0)='TRUE', 0x4, 0x1) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f00000004c0)='oom_score\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000200)=0x8001) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x1) preadv(r2, &(0x7f0000000140), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r6, &(0x7f0000000080), 0x0}, 0x18) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffe) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000200)="86"}) 08:21:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000280)={'lapb0\x00', {0x2, 0x0, @multicast2}}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xc01}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xbc31, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9}, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) request_key(0x0, &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000005c0)='\xd1?\xf3\xd7v', 0x0) 08:21:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'team_slave_0\x00', 0x4}, 0x18) r1 = gettid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/240, 0xf0}, 0x2}, {{&(0x7f00000005c0)=@pppol2tpv3, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/245, 0xf5}, {&(0x7f0000000740)=""/15, 0xf}, {0x0}], 0x3, &(0x7f0000000800)=""/58, 0x3a}, 0x5}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000004440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000004640)=[{&(0x7f0000004540)=""/213, 0xd5}], 0x1}, 0x1000}], 0x4, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x80000) ptrace$cont(0x4204, r1, 0x202, 0xa05000) 08:21:53 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x12) 08:21:53 executing program 3: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 08:21:53 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r0, r2, 0x0) 08:21:53 executing program 4: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000500)='\'\x00', 0x0) renameat(0xffffffffffffffff, 0x0, r0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x13f, 0x0, 0x0, 0xb2) setxattr$security_smack_transmute(&(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x1) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f00000004c0)='oom_score\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 08:21:53 executing program 0: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x5) r1 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000500)='\'\x00', 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) add_key(0x0, 0x0, &(0x7f00000002c0)="9e0f7eb54e0cf3a5beb99411025f2551150bfaa7ca1483fd152e6ad22ce12f3b4db243d4df22afde70a116b2c0943eb40e8101d2e9bb84a2c5c49d6f5e82098b7ef30217dc3417ce093c344bee30673eadb6a250aff8d7543bcce81d33e2df5b099f4013c89946cab9c739f8c1e97b5f06cf", 0x72, 0xfffffffffffffffc) request_key(&(0x7f0000000640)='\x9a\x9dNMuA\xffM\xf4\xc0\xe0JNq\xe5\xb5\"4\xd7? \x8f\xc2\x95\xdd\x88s\xbf\xc0Q\x7f!\x8b\x00xH\xadF\xdb\xe2\xc9\x96\xde9\xdf\x96\xb6\xb0\xd5\"c#\xb5\x9e5\xfdX\xe7Z\nzz\x82\xbe\xff]\xe0Ik9\x19\xf5\xbcf\xfbA88\x8d\x14\x98\xbfr~\xcd#\x0f&\xbb\xcd,\x9a\x02\xd5j\x99\xc0F$P\x1d\x90\xa5\x82\x7fPS\x1ey\xd9hrv^\xc4([C\xa0a\x9e\x10y\xf1\x91\xcbG\xefL\xaf\x14t\xd1Ar\xdf\xcc?\xba:8\x1e0\x9a2-\x15\xb8\x1c\x01\xd1\x80\xc1\\\xa0u\xa0NG\x10\x99%\x8f\xa9\xc1\n\xdc\xf8Y\xcd`\x8d\xf8\xe2\r\x16\xd0\n!\xc6\x92ca\xe5\x15\x92U];\xf8\xd8\xa5\xd1\x1f\x99)8\xc9\xf0G\xc1em\rh\xf1\xae\xe1bP\x04\xee\xdc\x87r\xf5x3\xa3+\xe9\xe3\xbf*\xdb\x9f\xa9\xe7\t\xcf\xc3\x04CQ\n(Px\x0e\xa0LE\xd1oi\x1c\xd5:\xf8\xa7Z5fo|\xbd\x84\x95\x90\x9cn\xc1U:*\xc0\xeaA\xbcR>\xad\x06P|}\t\xe5A\xc8N4\xf5\xc2\xf7\x7fO\b3\xe41\x94\xa6\xd2\xbc[\xdc\xc8j\xce\x06\xee', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000280)=')\x00', 0xfffffffffffffffc) read$eventfd(r3, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x13f, 0x0, 0x0, 0xb2) ioctl$BLKIOMIN(r2, 0x1278, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='.\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f00000003c0)='TRUE', 0x4, 0x1) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f00000004c0)='oom_score\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000200)=0x8001) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x1) preadv(r2, &(0x7f0000000140), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r6, &(0x7f0000000080), 0x0}, 0x18) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffe) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000200)="86"}) 08:21:53 executing program 5: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x5) r1 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000500)='\'\x00', 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) add_key(0x0, 0x0, &(0x7f00000002c0)="9e0f7eb54e0cf3a5beb99411025f2551150bfaa7ca1483fd152e6ad22ce12f3b4db243d4df22afde70a116b2c0943eb40e8101d2e9bb84a2c5c49d6f5e82098b7ef30217dc3417ce093c344bee30673eadb6a250aff8d7543bcce81d33e2df5b099f4013c89946cab9c739f8c1e97b5f06cf", 0x72, 0xfffffffffffffffc) request_key(&(0x7f0000000640)='\x9a\x9dNMuA\xffM\xf4\xc0\xe0JNq\xe5\xb5\"4\xd7? \x8f\xc2\x95\xdd\x88s\xbf\xc0Q\x7f!\x8b\x00xH\xadF\xdb\xe2\xc9\x96\xde9\xdf\x96\xb6\xb0\xd5\"c#\xb5\x9e5\xfdX\xe7Z\nzz\x82\xbe\xff]\xe0Ik9\x19\xf5\xbcf\xfbA88\x8d\x14\x98\xbfr~\xcd#\x0f&\xbb\xcd,\x9a\x02\xd5j\x99\xc0F$P\x1d\x90\xa5\x82\x7fPS\x1ey\xd9hrv^\xc4([C\xa0a\x9e\x10y\xf1\x91\xcbG\xefL\xaf\x14t\xd1Ar\xdf\xcc?\xba:8\x1e0\x9a2-\x15\xb8\x1c\x01\xd1\x80\xc1\\\xa0u\xa0NG\x10\x99%\x8f\xa9\xc1\n\xdc\xf8Y\xcd`\x8d\xf8\xe2\r\x16\xd0\n!\xc6\x92ca\xe5\x15\x92U];\xf8\xd8\xa5\xd1\x1f\x99)8\xc9\xf0G\xc1em\rh\xf1\xae\xe1bP\x04\xee\xdc\x87r\xf5x3\xa3+\xe9\xe3\xbf*\xdb\x9f\xa9\xe7\t\xcf\xc3\x04CQ\n(Px\x0e\xa0LE\xd1oi\x1c\xd5:\xf8\xa7Z5fo|\xbd\x84\x95\x90\x9cn\xc1U:*\xc0\xeaA\xbcR>\xad\x06P|}\t\xe5A\xc8N4\xf5\xc2\xf7\x7fO\b3\xe41\x94\xa6\xd2\xbc[\xdc\xc8j\xce\x06\xee', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000280)=')\x00', 0xfffffffffffffffc) read$eventfd(r3, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x13f, 0x0, 0x0, 0xb2) ioctl$BLKIOMIN(r2, 0x1278, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='.\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f00000003c0)='TRUE', 0x4, 0x1) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f00000004c0)='oom_score\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000200)=0x8001) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x1) preadv(r2, &(0x7f0000000140), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r6, &(0x7f0000000080), 0x0}, 0x18) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffe) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000200)="86"}) 08:21:53 executing program 2: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x5) r1 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000500)='\'\x00', 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) add_key(0x0, 0x0, &(0x7f00000002c0)="9e0f7eb54e0cf3a5beb99411025f2551150bfaa7ca1483fd152e6ad22ce12f3b4db243d4df22afde70a116b2c0943eb40e8101d2e9bb84a2c5c49d6f5e82098b7ef30217dc3417ce093c344bee30673eadb6a250aff8d7543bcce81d33e2df5b099f4013c89946cab9c739f8c1e97b5f06cf", 0x72, 0xfffffffffffffffc) request_key(&(0x7f0000000640)='\x9a\x9dNMuA\xffM\xf4\xc0\xe0JNq\xe5\xb5\"4\xd7? \x8f\xc2\x95\xdd\x88s\xbf\xc0Q\x7f!\x8b\x00xH\xadF\xdb\xe2\xc9\x96\xde9\xdf\x96\xb6\xb0\xd5\"c#\xb5\x9e5\xfdX\xe7Z\nzz\x82\xbe\xff]\xe0Ik9\x19\xf5\xbcf\xfbA88\x8d\x14\x98\xbfr~\xcd#\x0f&\xbb\xcd,\x9a\x02\xd5j\x99\xc0F$P\x1d\x90\xa5\x82\x7fPS\x1ey\xd9hrv^\xc4([C\xa0a\x9e\x10y\xf1\x91\xcbG\xefL\xaf\x14t\xd1Ar\xdf\xcc?\xba:8\x1e0\x9a2-\x15\xb8\x1c\x01\xd1\x80\xc1\\\xa0u\xa0NG\x10\x99%\x8f\xa9\xc1\n\xdc\xf8Y\xcd`\x8d\xf8\xe2\r\x16\xd0\n!\xc6\x92ca\xe5\x15\x92U];\xf8\xd8\xa5\xd1\x1f\x99)8\xc9\xf0G\xc1em\rh\xf1\xae\xe1bP\x04\xee\xdc\x87r\xf5x3\xa3+\xe9\xe3\xbf*\xdb\x9f\xa9\xe7\t\xcf\xc3\x04CQ\n(Px\x0e\xa0LE\xd1oi\x1c\xd5:\xf8\xa7Z5fo|\xbd\x84\x95\x90\x9cn\xc1U:*\xc0\xeaA\xbcR>\xad\x06P|}\t\xe5A\xc8N4\xf5\xc2\xf7\x7fO\b3\xe41\x94\xa6\xd2\xbc[\xdc\xc8j\xce\x06\xee', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000280)=')\x00', 0xfffffffffffffffc) read$eventfd(r3, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x13f, 0x0, 0x0, 0xb2) ioctl$BLKIOMIN(r2, 0x1278, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='.\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f00000003c0)='TRUE', 0x4, 0x1) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f00000004c0)='oom_score\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000200)=0x8001) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x1) preadv(r2, &(0x7f0000000140), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r6, &(0x7f0000000080), 0x0}, 0x18) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffe) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000200)="86"}) 08:21:53 executing program 1: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 08:21:53 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001340)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) 08:21:53 executing program 4: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000500)='\'\x00', 0x0) renameat(0xffffffffffffffff, 0x0, r0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x13f, 0x0, 0x0, 0xb2) setxattr$security_smack_transmute(&(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x1) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f00000004c0)='oom_score\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 08:21:53 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) close(r0) 08:21:53 executing program 2: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x5) memfd_create(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, &(0x7f00000002c0), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000640)='\x9a\x9dNMuA\xffM\xf4\xc0\xe0JNq\xe5\xb5\"4\xd7? \x8f\xc2\x95\xdd\x88s\xbf\xc0Q\x7f!\x8b\x00xH\xadF\xdb\xe2\xc9\x96\xde9\xdf\x96\xb6\xb0\xd5\"c#\xb5\x9e5\xfdX\xe7Z\nzz\x82\xbe\xff]\xe0Ik9\x19\xf5\xbcf\xfbA88\x8d\x14\x98\xbfr~\xcd#\x0f&\xbb\xcd,\x9a\x02\xd5j\x99\xc0F$P\x1d\x90\xa5\x82\x7fPS\x1ey\xd9hrv^\xc4([C\xa0a\x9e\x10y\xf1\x91\xcbG\xefL\xaf\x14t\xd1Ar\xdf\xcc?\xba:8\x1e0\x9a2-\x15\xb8\x1c\x01\xd1\x80\xc1\\\xa0u\xa0NG\x10\x99%\x8f\xa9\xc1\n\xdc\xf8Y\xcd`\x8d\xf8\xe2\r\x16\xd0\n!\xc6\x92ca\xe5\x15\x92U];\xf8\xd8\xa5\xd1\x1f\x99)8\xc9\xf0G\xc1em\rh\xf1\xae\xe1bP\x04\xee\xdc\x87r\xf5x3\xa3+\xe9\xe3\xbf*\xdb\x9f\xa9\xe7\t\xcf\xc3\x04CQ\n(Px\x0e\xa0LE\xd1oi\x1c\xd5:\xf8\xa7Z5fo|\xbd\x84\x95\x90\x9cn\xc1U:*\xc0\xeaA\xbcR>\xad\x06P|}\t\xe5A\xc8N4\xf5\xc2\xf7\x7fO\b3\xe41\x94\xa6\xd2\xbc[\xdc\xc8j\xce\x06\xee', 0x0, &(0x7f0000000280)=')\x00', 0xfffffffffffffffc) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) getpgid(0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x1f) io_setup(0x5, &(0x7f0000001440)=0x0) io_submit(r2, 0x2, &(0x7f0000001c00)=[&(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:21:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x400000000006, 0x0, 0x0, 0x50000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$sock_netdev_private(r0, 0x0, 0x0) 08:21:54 executing program 0: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x80000000) 08:21:54 executing program 2: getpid() r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3ffffeb, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400021b, 0x0) 08:21:54 executing program 5: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x40800, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) 08:21:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000b80)=[{{&(0x7f00000003c0)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000a80)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x1, 0x0) 08:21:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCGETS2(r0, 0x802c542a, 0x0) [ 148.177418] EXT4-fs warning (device sda1): ext4_group_extend:1764: will only finish group (524288 blocks, 256 new) [ 148.206787] audit: type=1800 audit(1560932514.419:38): pid=7271 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=16546 res=0 [ 148.234603] EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted [ 148.249224] audit: type=1804 audit(1560932514.419:39): pid=7271 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir852093762/syzkaller.SKvw1C/7/file0" dev="sda1" ino=16546 res=1 [ 148.279687] EXT4-fs warning (device sda1): ext4_group_extend:1764: will only finish group (524288 blocks, 256 new) [ 148.304348] EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted 08:21:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) shutdown(r2, 0x0) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000180)=""/34, 0x22}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r3, 0x0) 08:21:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x400000000006, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) 08:21:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) shutdown(r2, 0x0) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000180)=""/34, 0x22}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r3, 0x0) 08:21:54 executing program 5: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x40800, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) 08:21:54 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x40800, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x10000) [ 148.517690] audit: type=1800 audit(1560932514.729:40): pid=7297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=16573 res=0 08:21:54 executing program 0: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x2000000000001, 0xffffffffffffffff) recvfrom$inet(r0, 0x0, 0x28, 0x42, 0x0, 0x800e00570) shutdown(r0, 0x0) 08:21:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) shutdown(r2, 0x0) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000180)=""/34, 0x22}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r3, 0x0) [ 148.673493] audit: type=1804 audit(1560932514.759:41): pid=7297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir852093762/syzkaller.SKvw1C/8/file0" dev="sda1" ino=16573 res=1 08:21:54 executing program 3: poll(&(0x7f0000000040)=[{}], 0x1, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x24f, 0x0, 0x0, 0x800e004de) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/112, 0x70}], 0x1) shutdown(r0, 0x0) [ 148.764904] audit: type=1800 audit(1560932514.769:42): pid=7300 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16572 res=0 [ 148.821768] audit: type=1804 audit(1560932514.779:43): pid=7303 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir018867283/syzkaller.xXTHUw/9/file0" dev="sda1" ino=16572 res=1 [ 148.896922] syz-executor.5 (7297) used greatest stack depth: 24336 bytes left 08:21:55 executing program 2: getpid() r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3ffffeb, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400021b, 0x0) 08:21:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x400001006, &(0x7f0000000000)={0x0, 0x10008}, 0x10) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/34, 0x22}, {0x0}, {0x0}], 0x15) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x100000007, 0x0, 0x0, 0x800e007b6) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000480)=""/4096, 0x1000}, {0x0}], 0x2) shutdown(r1, 0x0) 08:21:55 executing program 5: r0 = socket(0x1e, 0x805, 0x0) connect$tipc(r0, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10) 08:21:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000100)={0x0, @loopback}, &(0x7f0000000880)=0x7) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[], 0xfffffcaa) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000002c0)) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40000) bind$inet6(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000005c0)=@assoc_value, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000380)=[{r2}, {r3, 0x8}], 0x2, &(0x7f00000003c0), &(0x7f0000000680)={0x400}, 0x8) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad66b6b30400fbab65d8b4ac2ca35c6e", 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, 0x0, 0x0) accept(r4, 0x0, 0x0) accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000580), 0x0) sendmmsg$unix(r4, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x1}], 0x1, 0x0) r5 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) splice(r1, 0x0, r4, 0x0, 0x80000001, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000180)={@rand_addr="3a8739f1997c7a02bcd499a1a885e5ef"}, 0x14) r6 = socket(0x2040000000002, 0x3, 0x3) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000240)='syz_tun\x00\x00\x00\x00\x00f\x00', 0xfffffffffffffec3) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) 08:21:55 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000435460000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 08:21:55 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt(r0, 0x0, 0x4, 0x0, 0x0) 08:21:55 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000435460000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 08:21:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, 0x0}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00c4e) 08:21:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) listen(0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0xd66, 0x0, 0x0, 0x800e00471) shutdown(r0, 0x0) 08:21:55 executing program 4: 08:21:55 executing program 4: 08:21:55 executing program 5: 08:21:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x0, 0x100000000000914, 0x8000000005}, 0x2c) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/243, 0xf3}, {0x0}, {&(0x7f0000000440)=""/162, 0xa2}], 0x4}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x335) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) perf_event_open(0x0, r4, 0xd, 0xffffffffffffffff, 0x2) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r3, &(0x7f00000003c0)=0x2b, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0c0583b, 0x20000001) recvmsg(r3, 0x0, 0x40002021) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x12, 0x0, 0x0, &(0x7f0000000600)='GPL\x00', 0x2, 0x0, 0x0, 0x41f00, 0x2, [], 0x0, 0x11, r3, 0x8, &(0x7f0000003a80)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000003ac0)={0x0, 0x8, 0x0, 0x9}, 0x10}, 0x70) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x18) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000005c0)={'lapb0\x00', 0x3400}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x1802a140) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 08:21:56 executing program 0: 08:21:56 executing program 4: 08:21:56 executing program 5: r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000001840)) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 08:21:56 executing program 3: 08:21:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000100)={0x0, @loopback}, &(0x7f0000000880)=0x7) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[], 0xfffffcaa) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000002c0)) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40000) bind$inet6(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000005c0)=@assoc_value, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000380)=[{r2}, {r3, 0x8}], 0x2, &(0x7f00000003c0), &(0x7f0000000680)={0x400}, 0x8) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad66b6b30400fbab65d8b4ac2ca35c6e", 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, 0x0, 0x0) accept(r4, 0x0, 0x0) accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000580), 0x0) sendmmsg$unix(r4, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x1}], 0x1, 0x0) r5 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) splice(r1, 0x0, r4, 0x0, 0x80000001, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000180)={@rand_addr="3a8739f1997c7a02bcd499a1a885e5ef"}, 0x14) r6 = socket(0x2040000000002, 0x3, 0x3) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000240)='syz_tun\x00\x00\x00\x00\x00f\x00', 0xfffffffffffffec3) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) 08:21:56 executing program 4: 08:21:56 executing program 3: 08:21:56 executing program 3: [ 150.155100] audit: type=1400 audit(1560932516.369:44): avc: denied { create } for pid=7380 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:21:56 executing program 0: 08:21:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) 08:21:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x0, 0x100000000000914, 0x8000000005}, 0x2c) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/243, 0xf3}, {0x0}, {&(0x7f0000000440)=""/162, 0xa2}], 0x4}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x335) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) perf_event_open(0x0, r4, 0xd, 0xffffffffffffffff, 0x2) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r3, &(0x7f00000003c0)=0x2b, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0c0583b, 0x20000001) recvmsg(r3, 0x0, 0x40002021) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x12, 0x0, 0x0, &(0x7f0000000600)='GPL\x00', 0x2, 0x0, 0x0, 0x41f00, 0x2, [], 0x0, 0x11, r3, 0x8, &(0x7f0000003a80)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000003ac0)={0x0, 0x8, 0x0, 0x9}, 0x10}, 0x70) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x18) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000005c0)={'lapb0\x00', 0x3400}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x1802a140) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 08:21:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 08:21:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:56 executing program 3: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) 08:21:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') recvmsg(r0, &(0x7f0000000cc0)={&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/204, 0xcc}, {&(0x7f0000000800)=""/149, 0x95}, {&(0x7f00000008c0)=""/202, 0xca}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/149, 0x95}, {&(0x7f0000000540)=""/80, 0x50}, {&(0x7f0000000b40)=""/107, 0x6b}], 0x8, &(0x7f0000000c40)=""/75, 0x4b}, 0x2020) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000005000)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000005040)={r3, 0x1, 0x6, @local}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1=0xac14140d}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}]}, 0x54}}, 0x0) [ 150.546329] audit: type=1400 audit(1560932516.759:45): avc: denied { write } for pid=7420 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 150.589910] audit: type=1400 audit(1560932516.799:46): avc: denied { read } for pid=7420 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 150.644155] Bearer rejected, not supported in standalone mode 08:21:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x0, 0x100000000000914, 0x8000000005}, 0x2c) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/243, 0xf3}, {0x0}, {&(0x7f0000000440)=""/162, 0xa2}], 0x4}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x335) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) perf_event_open(0x0, r4, 0xd, 0xffffffffffffffff, 0x2) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r3, &(0x7f00000003c0)=0x2b, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0c0583b, 0x20000001) recvmsg(r3, 0x0, 0x40002021) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x12, 0x0, 0x0, &(0x7f0000000600)='GPL\x00', 0x2, 0x0, 0x0, 0x41f00, 0x2, [], 0x0, 0x11, r3, 0x8, &(0x7f0000003a80)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000003ac0)={0x0, 0x8, 0x0, 0x9}, 0x10}, 0x70) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x18) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000005c0)={'lapb0\x00', 0x3400}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x1802a140) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 08:21:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x0, 0x100000000000914, 0x8000000005}, 0x2c) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/243, 0xf3}, {0x0}, {&(0x7f0000000440)=""/162, 0xa2}], 0x4}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x335) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) perf_event_open(0x0, r4, 0xd, 0xffffffffffffffff, 0x2) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r3, &(0x7f00000003c0)=0x2b, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0c0583b, 0x20000001) recvmsg(r3, 0x0, 0x40002021) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x12, 0x0, 0x0, &(0x7f0000000600)='GPL\x00', 0x2, 0x0, 0x0, 0x41f00, 0x2, [], 0x0, 0x11, r3, 0x8, &(0x7f0000003a80)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000003ac0)={0x0, 0x8, 0x0, 0x9}, 0x10}, 0x70) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x18) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000005c0)={'lapb0\x00', 0x3400}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x1802a140) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 08:21:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x0, 0x100000000000914, 0x8000000005}, 0x2c) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/243, 0xf3}, {0x0}, {&(0x7f0000000440)=""/162, 0xa2}], 0x4}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x335) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) perf_event_open(0x0, r4, 0xd, 0xffffffffffffffff, 0x2) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r3, &(0x7f00000003c0)=0x2b, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0c0583b, 0x20000001) recvmsg(r3, 0x0, 0x40002021) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x12, 0x0, 0x0, &(0x7f0000000600)='GPL\x00', 0x2, 0x0, 0x0, 0x41f00, 0x2, [], 0x0, 0x11, r3, 0x8, &(0x7f0000003a80)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000003ac0)={0x0, 0x8, 0x0, 0x9}, 0x10}, 0x70) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x18) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000005c0)={'lapb0\x00', 0x3400}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x1802a140) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 08:21:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') recvmsg(r0, &(0x7f0000000cc0)={&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/204, 0xcc}, {&(0x7f0000000800)=""/149, 0x95}, {&(0x7f00000008c0)=""/202, 0xca}, {&(0x7f00000009c0)=""/163, 0xa3}, {&(0x7f0000000a80)=""/149, 0x95}, {&(0x7f0000000540)=""/80, 0x50}, {&(0x7f0000000b40)=""/107, 0x6b}], 0x8, &(0x7f0000000c40)=""/75, 0x4b}, 0x2020) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000005000)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000005040)={r3, 0x1, 0x6, @local}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1=0xac14140d}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}]}, 0x54}}, 0x0) 08:21:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 151.007009] Bearer rejected, not supported in standalone mode 08:21:57 executing program 2: r0 = memfd_create(&(0x7f0000000140)='proc}GPLeth0^wlan0#:\x00', 0x0) clone(0x7fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$netlink(0x10, 0x3, 0xe) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400001000) execveat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) tkill(r1, 0x20) 08:21:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:57 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000002bc0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000089c0), 0x4000000000001d4, 0x0) 08:21:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:58 executing program 1: r0 = socket$inet6(0xa, 0x201000000000002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup2(r0, r1) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 08:21:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:58 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000002bc0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000089c0), 0x4000000000001d4, 0x0) 08:21:58 executing program 0: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x4ed4, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:21:58 executing program 2: syz_genetlink_get_family_id$net_dm(0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) 08:21:58 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0x2b7}], 0x1, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 08:21:58 executing program 0: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x4ed4, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:21:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 152.175472] device nr0 entered promiscuous mode 08:21:58 executing program 4: r0 = gettid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x04\x00', 0x5002}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000440)) fstat(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000180)='fuse\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8000fffffffe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x6, &(0x7f0000000040)) tkill(r0, 0x15) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 08:21:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) accept(0xffffffffffffffff, &(0x7f00000026c0)=@alg, &(0x7f0000002740)=0x80) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) [ 152.376519] device nr0 entered promiscuous mode 08:21:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) 08:21:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x72, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x5b, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x7}, 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x3ff) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 08:21:58 executing program 5: connect(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r0}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x0, 0x0, 0x2, 0x4, 0x101, 0x8}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) unlinkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) read$rfkill(r1, &(0x7f0000000240), 0x8) 08:21:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) 08:21:58 executing program 4: r0 = gettid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x04\x00', 0x5002}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000440)) fstat(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000180)='fuse\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8000fffffffe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x6, &(0x7f0000000040)) tkill(r0, 0x15) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 08:21:58 executing program 5: connect(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r0}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 152.758875] device nr0 entered promiscuous mode [ 152.806757] device nr0 entered promiscuous mode 08:21:59 executing program 5: connect(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r0}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:59 executing program 0: r0 = eventfd2(0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 08:21:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:59 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) [ 153.049895] SELinux: policydb version 2002021968 does not match my version range 15-31 [ 153.059816] SELinux: failed to load policy 08:21:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) 08:21:59 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000400)={{}, {0x0, 0x989680}}, 0x0) 08:21:59 executing program 0: r0 = eventfd2(0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 08:21:59 executing program 2: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) 08:21:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:59 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) [ 153.556391] SELinux: policydb version 2002021968 does not match my version range 15-31 [ 153.578891] kauditd_printk_skb: 2 callbacks suppressed 08:21:59 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, &(0x7f0000000040), r1, 0x0, 0xffffffff, 0x0) 08:21:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:59 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x3, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 153.578900] audit: type=1400 audit(1560932519.789:50): avc: denied { map } for pid=7607 comm="syz-executor.2" path=2F6D656D66643AB3202864656C6574656429 dev="tmpfs" ino=27239 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 08:21:59 executing program 2: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) 08:21:59 executing program 1: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) [ 153.647239] SELinux: failed to load policy 08:21:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:21:59 executing program 0: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) 08:21:59 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:21:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) 08:22:00 executing program 4: setresuid(0x0, 0xfffe, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/drop_pa#ket\x00', 0x2, 0x0) 08:22:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x35, 0x0, &(0x7f0000000100)="c5ffff00020af61294465e69140d8e788473057bdf0a9a1e3bbcd9d68de8a404406fed92208980f299a415b8fdcfeb10055b5e6357", 0x0}, 0x28) 08:22:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:00 executing program 2: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) [ 153.814353] SELinux: policydb version 2002021968 does not match my version range 15-31 08:22:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="c5ffff00020af61294465e69140d", 0x0}, 0x28) [ 153.876155] SELinux: failed to load policy 08:22:00 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x589, 0x2) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000100)=0xffff, 0x4) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000140)) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f0000000300), 0x7fff) 08:22:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:00 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:22:00 executing program 1: 08:22:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:00 executing program 4: 08:22:00 executing program 2: [ 154.039251] SELinux: policydb version 2002021968 does not match my version range 15-31 08:22:00 executing program 1: 08:22:00 executing program 4: r0 = socket$inet6(0xa, 0x201000000000002, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) [ 154.111620] SELinux: failed to load policy 08:22:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = epoll_create1(0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 08:22:00 executing program 3: write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:22:00 executing program 2: 08:22:00 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x589, 0x2) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000100)=0xffff, 0x4) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000140)) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f0000000300), 0x7fff) 08:22:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:00 executing program 3: write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:22:00 executing program 2: 08:22:00 executing program 1: 08:22:00 executing program 2: 08:22:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:00 executing program 3: write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:22:01 executing program 4: 08:22:01 executing program 1: 08:22:01 executing program 2: 08:22:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:01 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:22:01 executing program 0: 08:22:01 executing program 1: 08:22:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:01 executing program 2: 08:22:01 executing program 4: 08:22:01 executing program 0: 08:22:01 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:22:01 executing program 0: 08:22:01 executing program 4: 08:22:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:01 executing program 1: 08:22:01 executing program 2: 08:22:01 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:22:01 executing program 0: 08:22:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:01 executing program 4: 08:22:01 executing program 1: 08:22:01 executing program 2: 08:22:01 executing program 3: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:22:01 executing program 1: 08:22:01 executing program 0: 08:22:01 executing program 2: 08:22:01 executing program 3: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:22:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:01 executing program 4: 08:22:01 executing program 2: 08:22:01 executing program 1: 08:22:01 executing program 2: 08:22:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:01 executing program 4: 08:22:01 executing program 0: 08:22:01 executing program 3: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd860246"}, 0x20) 08:22:01 executing program 4: 08:22:01 executing program 0: 08:22:01 executing program 2: 08:22:01 executing program 1: 08:22:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:01 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 08:22:01 executing program 2: 08:22:01 executing program 1: 08:22:01 executing program 0: 08:22:01 executing program 4: [ 155.694000] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 08:22:01 executing program 2: 08:22:02 executing program 1: 08:22:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 155.760213] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 155.814694] CPU: 1 PID: 7811 Comm: syz-executor.3 Not tainted 4.14.128 #22 [ 155.821763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.831126] Call Trace: [ 155.833733] dump_stack+0x138/0x19c [ 155.837378] warn_alloc.cold+0x96/0x1af [ 155.841365] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 155.846217] ? lock_downgrade+0x6e0/0x6e0 [ 155.850379] ? avc_has_perm+0x2df/0x4b0 [ 155.854366] __vmalloc_node_range+0x3be/0x6a0 [ 155.858879] ? trace_hardirqs_on+0x10/0x10 [ 155.863122] vmalloc+0x46/0x50 [ 155.866320] ? sel_write_load+0x1a0/0x1050 [ 155.870559] sel_write_load+0x1a0/0x1050 [ 155.874624] ? save_trace+0x290/0x290 [ 155.878444] ? sel_read_bool+0x240/0x240 [ 155.882511] ? trace_hardirqs_on+0x10/0x10 [ 155.886758] ? save_trace+0x290/0x290 [ 155.890565] __vfs_write+0x105/0x6b0 [ 155.890614] ? __lock_is_held+0xb6/0x140 [ 155.890626] ? sel_read_bool+0x240/0x240 [ 155.890636] ? kernel_read+0x120/0x120 [ 155.890646] ? __lock_is_held+0xb6/0x140 08:22:02 executing program 1: 08:22:02 executing program 2: [ 155.890658] ? check_preemption_disabled+0x3c/0x250 [ 155.890673] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 155.890686] ? rcu_read_lock_sched_held+0x110/0x130 [ 155.890696] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 155.890706] ? __sb_start_write+0x153/0x2f0 [ 155.890717] vfs_write+0x198/0x500 [ 155.890728] SyS_write+0xfd/0x230 [ 155.890739] ? SyS_read+0x230/0x230 [ 155.890748] ? do_syscall_64+0x53/0x640 [ 155.890757] ? SyS_read+0x230/0x230 [ 155.890766] do_syscall_64+0x1e8/0x640 [ 155.890772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 155.890785] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 155.890794] RIP: 0033:0x4592c9 [ 155.935374] RSP: 002b:00007f72a3934c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 155.935387] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 155.935393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 155.935399] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 155.935405] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f72a39356d4 08:22:02 executing program 4: 08:22:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 155.935411] R13: 00000000004c9279 R14: 00000000004e0280 R15: 00000000ffffffff [ 155.950424] Mem-Info: [ 156.039692] active_anon:92270 inactive_anon:188 isolated_anon:0 [ 156.039692] active_file:8158 inactive_file:11663 isolated_file:0 [ 156.039692] unevictable:0 dirty:744 writeback:0 unstable:0 [ 156.039692] slab_reclaimable:11381 slab_unreclaimable:100732 [ 156.039692] mapped:58921 shmem:242 pagetables:1032 bounce:0 [ 156.039692] free:1312685 free_pcp:355 free_cma:0 [ 156.084063] Node 0 active_anon:369000kB inactive_anon:744kB active_file:32496kB inactive_file:46680kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235596kB dirty:3000kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 131072kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 156.112899] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 156.138869] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 156.165656] lowmem_reserve[]: 0 2580 2580 2580 [ 156.170348] Node 0 DMA32 free:1448604kB min:36468kB low:45584kB high:54700kB active_anon:369000kB inactive_anon:744kB active_file:32496kB inactive_file:46680kB unevictable:0kB writepending:3000kB present:3129332kB managed:2644912kB mlocked:0kB kernel_stack:7104kB pagetables:3968kB bounce:0kB free_pcp:1232kB local_pcp:620kB free_cma:0kB [ 156.200957] lowmem_reserve[]: 0 0 0 0 [ 156.204796] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 156.231368] lowmem_reserve[]: 0 0 0 0 [ 156.235202] Node 1 Normal free:3786636kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 156.263248] lowmem_reserve[]: 0 0 0 0 [ 156.267086] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 156.285165] Node 0 DMA32: 7222*4kB (UME) 20*8kB (UME) 16*16kB (UME) 4*32kB (ME) 1*64kB (U) 5*128kB (ME) 12*256kB (UME) 14*512kB (UME) 5*1024kB (UME) 3*2048kB (ME) 341*4096kB (M) = 1448376kB [ 156.305082] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 156.324296] Node 1 Normal: 51*4kB (UME) 340*8kB (UM) 280*16kB (UME) 59*32kB (UME) 15*64kB (UM) 7*128kB (U) 8*256kB (UME) 2*512kB (UE) 2*1024kB (ME) 5*2048kB (UME) 918*4096kB (M) = 3786636kB [ 156.356924] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 156.366235] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 156.374977] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 08:22:02 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 08:22:02 executing program 0: 08:22:02 executing program 1: 08:22:02 executing program 4: 08:22:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:02 executing program 2: [ 156.384599] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 156.393508] 20074 total pagecache pages [ 156.397487] 0 pages in swap cache [ 156.401311] Swap cache stats: add 0, delete 0, find 0/0 [ 156.406666] Free swap = 0kB [ 156.409660] Total swap = 0kB [ 156.412746] 1965979 pages RAM [ 156.415867] 0 pages HighMem/MovableOnly [ 156.419817] 333222 pages reserved [ 156.423367] 0 pages cma reserved 08:22:02 executing program 2: 08:22:02 executing program 1: 08:22:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, &(0x7f0000000040)) recvfrom$inet(r0, 0x0, 0x100000211, 0x0, 0x0, 0x800e00837) shutdown(r0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, 0x0, &(0x7f0000000340)) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x400000000006, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x0) read(r0, 0x0, 0x0) 08:22:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 156.502410] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 08:22:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x400000000006, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) [ 156.584695] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 156.620519] CPU: 0 PID: 7848 Comm: syz-executor.3 Not tainted 4.14.128 #22 [ 156.627576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.627585] Call Trace: [ 156.639526] dump_stack+0x138/0x19c [ 156.643179] warn_alloc.cold+0x96/0x1af [ 156.647177] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 156.652031] ? lock_downgrade+0x6e0/0x6e0 [ 156.652052] ? avc_has_perm+0x2df/0x4b0 [ 156.652068] __vmalloc_node_range+0x3be/0x6a0 [ 156.652081] ? trace_hardirqs_on+0x10/0x10 [ 156.652095] vmalloc+0x46/0x50 [ 156.652105] ? sel_write_load+0x1a0/0x1050 [ 156.676391] sel_write_load+0x1a0/0x1050 [ 156.680481] ? save_trace+0x290/0x290 [ 156.684304] ? sel_read_bool+0x240/0x240 [ 156.688375] ? trace_hardirqs_on+0x10/0x10 [ 156.692612] ? save_trace+0x290/0x290 [ 156.696438] __vfs_write+0x105/0x6b0 [ 156.700173] ? __lock_is_held+0xb6/0x140 [ 156.704256] ? sel_read_bool+0x240/0x240 [ 156.708335] ? kernel_read+0x120/0x120 [ 156.712238] ? __lock_is_held+0xb6/0x140 [ 156.716313] ? check_preemption_disabled+0x3c/0x250 [ 156.721366] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 156.726837] ? rcu_read_lock_sched_held+0x110/0x130 [ 156.731870] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 156.737005] ? __sb_start_write+0x153/0x2f0 [ 156.741358] vfs_write+0x198/0x500 [ 156.744924] SyS_write+0xfd/0x230 [ 156.748402] ? SyS_read+0x230/0x230 [ 156.752053] ? do_syscall_64+0x53/0x640 [ 156.756030] ? SyS_read+0x230/0x230 [ 156.759661] do_syscall_64+0x1e8/0x640 [ 156.763553] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 156.768403] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 156.768414] RIP: 0033:0x4592c9 [ 156.768420] RSP: 002b:00007f72a3934c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 08:22:03 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 08:22:03 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x400000000006, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) fchown(r0, 0x0, 0x0) 08:22:03 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x400000000006, 0x0, 0x0, 0x50000}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) 08:22:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x400000000006, 0x0, 0x0, 0x50000}]}) r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) [ 156.768432] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 156.768438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 156.768444] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 156.768450] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f72a39356d4 [ 156.768458] R13: 00000000004c9279 R14: 00000000004e0280 R15: 00000000ffffffff 08:22:03 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f000094cff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x3) 08:22:03 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 156.901479] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 156.978432] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 157.004402] CPU: 1 PID: 7882 Comm: syz-executor.3 Not tainted 4.14.128 #22 [ 157.011464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.020824] Call Trace: [ 157.023428] dump_stack+0x138/0x19c [ 157.027165] warn_alloc.cold+0x96/0x1af [ 157.031152] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 157.036003] ? lock_downgrade+0x6e0/0x6e0 [ 157.040159] ? avc_has_perm+0x2df/0x4b0 [ 157.044156] __vmalloc_node_range+0x3be/0x6a0 [ 157.048672] ? trace_hardirqs_on+0x10/0x10 [ 157.052919] vmalloc+0x46/0x50 [ 157.052932] ? sel_write_load+0x1a0/0x1050 [ 157.052941] sel_write_load+0x1a0/0x1050 [ 157.052951] ? save_trace+0x290/0x290 [ 157.052966] ? sel_read_bool+0x240/0x240 [ 157.052977] ? trace_hardirqs_on+0x10/0x10 08:22:03 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) [ 157.052987] ? save_trace+0x290/0x290 [ 157.053001] __vfs_write+0x105/0x6b0 [ 157.053010] ? __lock_is_held+0xb6/0x140 [ 157.053020] ? sel_read_bool+0x240/0x240 [ 157.053029] ? kernel_read+0x120/0x120 [ 157.053038] ? __lock_is_held+0xb6/0x140 [ 157.053049] ? check_preemption_disabled+0x3c/0x250 [ 157.053065] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 157.064605] ? rcu_read_lock_sched_held+0x110/0x130 [ 157.082930] hfs: unable to parse mount options [ 157.084171] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 157.084184] ? __sb_start_write+0x153/0x2f0 [ 157.084197] vfs_write+0x198/0x500 [ 157.084211] SyS_write+0xfd/0x230 [ 157.136515] ? SyS_read+0x230/0x230 [ 157.140157] ? do_syscall_64+0x53/0x640 [ 157.144139] ? SyS_read+0x230/0x230 [ 157.147784] do_syscall_64+0x1e8/0x640 [ 157.151681] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 157.156627] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 157.161828] RIP: 0033:0x4592c9 [ 157.165032] RSP: 002b:00007f72a3934c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 08:22:03 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, 0x0}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:03 executing program 1: getpid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0x0, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x0, 0x0, 0x39, 0x0, 0x0, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x6b, 0x20, 0x78}, 0x0, 0x0, r0, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 157.172750] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 157.180016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 157.187286] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 157.194584] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f72a39356d4 [ 157.201873] R13: 00000000004c9279 R14: 00000000004e0280 R15: 00000000ffffffff [ 157.267504] hfs: unable to parse mount options 08:22:03 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f0000000080), r1, 0x0, 0x81, 0x0) 08:22:03 executing program 4: getpid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0x0, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x0, 0x0, 0x39, 0x0, 0x0, 0xe6, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, 0x0, 0x0, r0, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 157.423793] warn_alloc_show_mem: 1 callbacks suppressed [ 157.423797] Mem-Info: [ 157.436863] active_anon:92278 inactive_anon:186 isolated_anon:0 [ 157.436863] active_file:8159 inactive_file:11680 isolated_file:0 [ 157.436863] unevictable:0 dirty:762 writeback:0 unstable:0 [ 157.436863] slab_reclaimable:11588 slab_unreclaimable:103250 [ 157.436863] mapped:58951 shmem:242 pagetables:1016 bounce:0 [ 157.436863] free:1310010 free_pcp:250 free_cma:0 [ 157.471533] Node 0 active_anon:369040kB inactive_anon:748kB active_file:32500kB inactive_file:46740kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235672kB dirty:3068kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 131072kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 157.500473] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 157.526321] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 157.553043] lowmem_reserve[]: 0 2580 2580 2580 [ 157.557643] Node 0 DMA32 free:1438292kB min:36468kB low:45584kB high:54700kB active_anon:369040kB inactive_anon:748kB active_file:32500kB inactive_file:46740kB unevictable:0kB writepending:3072kB present:3129332kB managed:2644912kB mlocked:0kB kernel_stack:7104kB pagetables:4052kB bounce:0kB free_pcp:1444kB local_pcp:688kB free_cma:0kB [ 157.587765] lowmem_reserve[]: 0 0 0 0 [ 157.591636] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 157.617040] lowmem_reserve[]: 0 0 0 0 [ 157.620919] Node 1 Normal free:3786636kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 157.649075] lowmem_reserve[]: 0 0 0 0 [ 157.652903] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 157.666620] Node 0 DMA32: 7839*4kB (UME) 97*8kB (UME) 11*16kB (UME) 3*32kB (UME) 2*64kB (M) 3*128kB (UME) 8*256kB (ME) 13*512kB (ME) 4*1024kB (ME) 6*2048kB (UME) 337*4096kB (M) = 1438356kB [ 157.683729] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 157.694528] Node 1 Normal: 51*4kB (UME) 340*8kB (UM) 280*16kB (UME) 59*32kB (UME) 15*64kB (UM) 7*128kB (U) 8*256kB (UME) 2*512kB (UE) 2*1024kB (ME) 5*2048kB (UME) 918*4096kB (M) = 3786636kB [ 157.711676] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 157.720551] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 157.729131] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 157.738091] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 157.746729] 20087 total pagecache pages [ 157.750756] 0 pages in swap cache [ 157.754210] Swap cache stats: add 0, delete 0, find 0/0 [ 157.759583] Free swap = 0kB [ 157.762641] Total swap = 0kB [ 157.765687] 1965979 pages RAM [ 157.768773] 0 pages HighMem/MovableOnly 08:22:04 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) 08:22:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x400000000006, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_netdev_private(r0, 0x0, 0x0) 08:22:04 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000002c0)={0x7, 0x4, [0x0]}) 08:22:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, 0x0}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:04 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:04 executing program 4: getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 157.773299] 333222 pages reserved [ 157.776741] 0 pages cma reserved 08:22:04 executing program 0: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}}) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, 0x0, 0x44801) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x40000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000900), &(0x7f0000000940)=0x4) [ 157.831245] SELinux: failed to load policy 08:22:04 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) [ 157.868723] hfs: unable to parse mount options 08:22:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, 0x0}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:04 executing program 4: getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 08:22:04 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) [ 157.964950] SELinux: failed to load policy 08:22:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:04 executing program 4: migrate_pages(0x0, 0x2a, 0x0, &(0x7f0000000000)=0x2) 08:22:04 executing program 1: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a6a6252ff3102addfa930004"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x40000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000900), &(0x7f0000000940)=0x4) 08:22:04 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) [ 158.047857] hfs: unable to parse mount options 08:22:04 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:04 executing program 0: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}}) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, 0x0, 0x44801) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x40000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000900), &(0x7f0000000940)=0x4) [ 158.135640] SELinux: failed to load policy 08:22:04 executing program 4: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}}) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000900), 0x0) 08:22:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:04 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec"}, 0x18) [ 158.235715] hfs: unable to parse mount options 08:22:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 158.326463] SELinux: failed to load policy 08:22:04 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:04 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec"}, 0x18) 08:22:04 executing program 1: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a6a6252ff3102addfa930004"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x40000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000900), &(0x7f0000000940)=0x4) 08:22:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 158.507025] SELinux: failed to load policy 08:22:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 158.656658] SELinux: failed to load policy 08:22:04 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) 08:22:04 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7"}, 0x1c) 08:22:05 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7"}, 0x1c) [ 158.774924] SELinux: failed to load policy 08:22:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000240)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) 08:22:05 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:05 executing program 4: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}}) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000900), 0x0) [ 158.914564] SELinux: failed to load policy 08:22:05 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7"}, 0x1c) 08:22:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000000c0)={0x2f, 0x4, 0x0, {0x0, 0x10000, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'hsr0\x00\xf6\x03\x00L\x00', 0x1001}) 08:22:05 executing program 0: prctl$PR_SET_DUMPABLE(0x4, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:22:05 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) [ 159.025245] SELinux: failed to load policy 08:22:05 executing program 4: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}}) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1000002b3) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000900), 0x0) 08:22:05 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd86"}, 0x1e) 08:22:05 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) [ 159.129365] SELinux: failed to load policy 08:22:05 executing program 0: prctl$PR_GET_FPEXC(0xb, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") prctl$PR_SET_DUMPABLE(0x4, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) 08:22:05 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd86"}, 0x1e) [ 159.150182] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 159.156222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:22:05 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000000000)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x43) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 08:22:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:05 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) [ 159.249238] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 159.256111] SELinux: failed to load policy [ 159.277139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:22:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000000c0)={0x2f, 0x4, 0x0, {0x0, 0x10000, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'hsr0\x00\xf6\x03\x00L\x00', 0x1001}) 08:22:05 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 08:22:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, 0x0, 0x0) 08:22:05 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) 08:22:05 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:05 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd86"}, 0x1e) [ 159.399933] SELinux: failed to load policy 08:22:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, 0x0, 0x0) 08:22:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000000c0)={0x2f, 0x4, 0x0, {0x0, 0x10000, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'hsr0\x00\xf6\x03\x00L\x00', 0x1001}) [ 159.445955] hfs: can't find a HFS filesystem on dev loop2 [ 159.477471] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 08:22:05 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd8602"}, 0x1f) 08:22:05 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)) [ 159.495417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:22:05 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, 0x0, 0x0) 08:22:05 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001280)={0x3, 0x0, [{0x0, 0x0, 0x0}, {0xa76659634fb6144f, 0x3a, &(0x7f0000000040)=""/58}, {0x0, 0x0, 0x0}]}) 08:22:05 executing program 4: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x20000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1bf) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x1b00, r1, &(0x7f0000000000), 0xfffffce4}]) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f00000000c0)) 08:22:05 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd8602"}, 0x1f) [ 159.577711] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 159.613681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:22:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 08:22:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000000c0)={0x2f, 0x4, 0x0, {0x0, 0x10000, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'hsr0\x00\xf6\x03\x00L\x00', 0x1001}) [ 159.682330] hfs: can't find a HFS filesystem on dev loop2 08:22:05 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "506e54777370aaec70c94ad7fd8602"}, 0x1f) 08:22:06 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 159.730099] audit: type=1400 audit(1560932525.939:51): avc: denied { map } for pid=8147 comm="syz-executor.4" path="/dev/nullb0" dev="devtmpfs" ino=14048 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 08:22:06 executing program 1: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1bf) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x1b00, r1, &(0x7f0000000000), 0xfffffce4}]) 08:22:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 159.815891] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 159.824100] hfs: can't find a HFS filesystem on dev loop2 08:22:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 159.862384] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:22:06 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 08:22:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000000c0)={0x2f, 0x4, 0x0, {0x0, 0x10000, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'hsr0\x00\xf6\x03\x00L\x00', 0x1001}) [ 159.987437] hfs: unable to parse mount options [ 160.042677] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 160.049547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:22:06 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) 08:22:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 08:22:06 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:06 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_gstrings}) 08:22:06 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) 08:22:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r1, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 160.261404] hfs: unable to parse mount options 08:22:06 executing program 1: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1bf) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x1b00, r1, &(0x7f0000000000), 0xfffffce4}]) 08:22:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 08:22:06 executing program 3: r0 = socket(0x18, 0x10000003, 0x0) fcntl$setstatus(r0, 0x4, 0x1010040) shutdown(r0, 0x1) 08:22:06 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@gid={'gid'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='dctcp\x00', 0x16b) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f1c8a3338fe2c7ae84358c9bb55fd0b3d22b176c503d90709db7672bc217c2b8a1fe0b795ac0f9701a7d6926ec1b1e20f02b9b820b29b03045fe7a757aed2fbb9fe797f1391b8130d13e51ac105ee9013508b5f05b3cae351953ce86f4b486fadcfe34c03a6af39d7fb1ba487f6e5ff9c51060f533c44a0cdf0eb027574ae9444aa0f9f8e735b0b12384e8e7cf3ad6f8a0750a0b96a5cb407e10161e9525d9d75ba26a403a7cf0cd330ada30c065eab998c926e1fe9fa5187a8b0f238ab9fdd1a6ef95ab8d736091f3", 0xc9, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='lp\x00', 0x3c9) shutdown(r0, 0x1) 08:22:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="d9b01f637d198fffec9b329f99c5", 0x0}, 0x28) 08:22:06 executing program 1: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0xd, &(0x7f0000000300), 0x4) 08:22:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 08:22:06 executing program 0: open$dir(&(0x7f00000000c0)='./file0\x00', 0x60221, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x10, r0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4) [ 160.738652] hfs: unable to parse mount options 08:22:07 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:07 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:07 executing program 4: r0 = socket(0x18, 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x1010040) shutdown(r0, 0x1) 08:22:07 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="820201f07b"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x10) 08:22:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x40000) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0xa) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getpeername(r2, 0x0, &(0x7f00000000c0)) close(r2) 08:22:07 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:07 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 160.891108] hfs: unable to parse mount options 08:22:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:22:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@ip_tos_u8={{0x11}}], 0x18}}], 0x2, 0x40000) 08:22:07 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x71) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "db064c3355b57bff"}}, 0x48}}, 0x0) 08:22:07 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:07 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:22:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='numa_maps\x00') sendfile(r0, r0, &(0x7f0000000000)=0xf00, 0xffff) [ 161.063242] hfs: unable to parse mount options 08:22:07 executing program 0: 08:22:07 executing program 5: 08:22:07 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@session={'session'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) [ 161.237646] hfs: unable to parse mount options 08:22:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x40000) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0xa) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getpeername(r2, 0x0, &(0x7f00000000c0)) close(r2) 08:22:07 executing program 5: 08:22:07 executing program 0: 08:22:07 executing program 4: 08:22:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='numa_maps\x00') sendfile(r0, r0, &(0x7f0000000000)=0xf00, 0xffff) 08:22:07 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:07 executing program 0: 08:22:07 executing program 4: 08:22:08 executing program 5: [ 161.759206] hfs: unable to parse mount options 08:22:08 executing program 0: 08:22:08 executing program 4: 08:22:08 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:08 executing program 3: 08:22:08 executing program 1: 08:22:08 executing program 5: 08:22:08 executing program 0: 08:22:08 executing program 4: [ 161.946843] hfs: unable to parse mount options 08:22:08 executing program 5: 08:22:08 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:08 executing program 1: 08:22:08 executing program 4: 08:22:08 executing program 0: 08:22:08 executing program 3: 08:22:08 executing program 5: 08:22:08 executing program 1: 08:22:08 executing program 4: 08:22:08 executing program 0: 08:22:08 executing program 3: 08:22:08 executing program 5: [ 162.146276] hfs: unable to parse mount options 08:22:08 executing program 4: 08:22:08 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:08 executing program 1: 08:22:08 executing program 0: 08:22:08 executing program 3: 08:22:08 executing program 5: 08:22:08 executing program 4: 08:22:08 executing program 1: 08:22:08 executing program 0: [ 162.316991] hfs: unable to parse mount options 08:22:08 executing program 3: 08:22:08 executing program 5: 08:22:08 executing program 4: 08:22:08 executing program 1: 08:22:08 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:08 executing program 5: 08:22:08 executing program 4: 08:22:08 executing program 0: 08:22:08 executing program 3: 08:22:08 executing program 5: [ 162.491918] hfs: unable to parse mount options 08:22:08 executing program 1: 08:22:08 executing program 0: 08:22:08 executing program 4: 08:22:08 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:08 executing program 5: 08:22:08 executing program 3: 08:22:08 executing program 1: 08:22:08 executing program 0: 08:22:08 executing program 4: 08:22:08 executing program 5: [ 162.681910] hfs: unable to parse mount options 08:22:08 executing program 3: 08:22:08 executing program 1: 08:22:08 executing program 4: 08:22:09 executing program 5: 08:22:09 executing program 0: 08:22:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@session={'session', 0x3d, 0x1}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:09 executing program 3: 08:22:09 executing program 1: 08:22:09 executing program 0: 08:22:09 executing program 4: 08:22:09 executing program 5: 08:22:09 executing program 3: 08:22:09 executing program 1: [ 162.883170] hfs: unable to parse mount options 08:22:09 executing program 0: 08:22:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@umask={'umask', 0x3d, 0x800}}, {@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:09 executing program 5: 08:22:09 executing program 4: 08:22:09 executing program 1: 08:22:09 executing program 3: 08:22:09 executing program 0: 08:22:09 executing program 3: 08:22:09 executing program 5: [ 163.068244] hfs: unable to parse mount options 08:22:09 executing program 1: 08:22:09 executing program 4: 08:22:09 executing program 0: 08:22:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}]}) 08:22:09 executing program 5: 08:22:09 executing program 3: 08:22:09 executing program 0: 08:22:09 executing program 1: [ 163.226954] hfs: unable to parse mount options 08:22:09 executing program 4: 08:22:09 executing program 5: 08:22:09 executing program 3: 08:22:09 executing program 1: 08:22:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 08:22:09 executing program 0: 08:22:09 executing program 5: 08:22:09 executing program 4: 08:22:09 executing program 3: 08:22:09 executing program 1: 08:22:09 executing program 0: 08:22:09 executing program 5: 08:22:09 executing program 3: [ 163.408165] hfs: can't find a HFS filesystem on dev loop2 08:22:09 executing program 4: 08:22:09 executing program 1: 08:22:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 08:22:09 executing program 0: 08:22:09 executing program 5: 08:22:09 executing program 4: 08:22:09 executing program 1: 08:22:09 executing program 3: 08:22:09 executing program 4: 08:22:09 executing program 0: [ 163.607064] hfs: can't find a HFS filesystem on dev loop2 08:22:09 executing program 5: 08:22:09 executing program 4: 08:22:09 executing program 3: 08:22:09 executing program 1: 08:22:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 08:22:09 executing program 0: 08:22:09 executing program 1: 08:22:09 executing program 5: 08:22:10 executing program 3: 08:22:10 executing program 4: 08:22:10 executing program 0: 08:22:10 executing program 1: 08:22:10 executing program 5: 08:22:10 executing program 3: [ 163.817351] hfs: can't find a HFS filesystem on dev loop2 08:22:10 executing program 4: 08:22:10 executing program 0: 08:22:10 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type'}}]}) 08:22:10 executing program 3: 08:22:10 executing program 0: 08:22:10 executing program 4: 08:22:10 executing program 5: 08:22:10 executing program 1: 08:22:10 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value, 0x0) 08:22:10 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x3, 0x0) read$FUSE(r0, 0x0, 0x0) [ 164.023648] hfs: unable to parse mount options 08:22:10 executing program 1: rt_sigaction(0x21, &(0x7f0000000400)={0x0, {}, 0x0, 0x0}, &(0x7f00000004c0)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000500)) 08:22:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140), 0x0) 08:22:10 executing program 4: mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) 08:22:10 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@obj_type={'obj_type'}}]}) 08:22:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x100000000000005) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) 08:22:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 08:22:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:10 executing program 5: r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xc838) [ 164.191726] hfs: unable to parse mount options 08:22:10 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@obj_type={'obj_type'}}]}) [ 164.282654] mkiss: ax0: crc mode is auto. 08:22:10 executing program 0: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@nodots='nodots'}], [{@appraise='appraise'}]}) [ 164.314476] x25_asy: x25_asy_alloc(): register_netdev() failure 08:22:10 executing program 3: rt_sigaction(0x21, 0x0, &(0x7f00000004c0)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000500)) [ 164.355277] hfs: unable to parse mount options 08:22:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0xfffffdc9) 08:22:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:10 executing program 5: r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000001840)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000}], 0x0, 0x8000, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x40, 0x3}, 0x10}, 0x70) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x90, 0x0, 0x700, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfbdc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2e9f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5be}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x20004004}, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x4000000000000000, 'memory'}]}, 0xc838) 08:22:10 executing program 2: syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@codepage={'codepage', 0x3d, 'cp936'}}, {@dir_umask={'dir_umask'}}, {@gid={'gid'}}, {@file_umask={'file_umask'}}], [{@obj_type={'obj_type'}}]}) [ 164.441561] mkiss: ax0: crc mode is auto. [ 164.523201] hfs: unable to parse mount options 08:22:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x100000000000005) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:10 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000001840)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x51}], 0x0, 0x8000, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x40, 0x3}, 0x10}, 0x70) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x84, 0x0, 0x700, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfbdc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5be}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x926}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20004004}, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x4000000000000000, 'memory'}]}, 0xc838) 08:22:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:10 executing program 5: set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) clone(0x80060100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:22:10 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mount$9p_tcp(&(0x7f00000001c0)='-27.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=tcp']) [ 164.719301] mkiss: ax0: crc mode is auto. 08:22:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4, "b2f6386a"}, 0x0) 08:22:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) [ 164.780542] 9pnet: p9_fd_create_tcp (8685): problem connecting socket to -27.0.0.1 08:22:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) read$alg(r0, &(0x7f0000000080)=""/232, 0xe8) 08:22:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[{0x10, 0x0, 0x100000001}], 0x10}}], 0x1, 0x0) 08:22:11 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x20000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, 0x0}]) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f00000000c0)=0x8) 08:22:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0xfffffdc9) 08:22:11 executing program 2: r0 = getpgrp(0xffffffffffffffff) getpgid(r0) 08:22:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:11 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x1, 0x0) 08:22:11 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}]}) 08:22:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:11 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) 08:22:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000880)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x0, r0, &(0x7f0000000200)}]) 08:22:11 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x20000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, 0x0}]) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f00000000c0)=0x8) 08:22:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) [ 165.535578] ISOFS: Unable to identify CD-ROM format. 08:22:11 executing program 1: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x20000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, 0x0}]) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f00000000c0)=0x8) 08:22:11 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x1, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000180)={0x7}, 0x7) [ 165.807157] ISOFS: Unable to identify CD-ROM format. 08:22:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x4, 0x4}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000180)=""/149, 0x30, 0x95, 0x1}, 0x20) 08:22:12 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mknod$loop(&(0x7f00000002c0)='./file1\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:12 executing program 2: r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file1/file0\x00', 0x0) rename(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file1/file0/file0\x00') 08:22:12 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x12, 0x0, 0x0, 0x0}, 0x20) 08:22:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(0xffffffffffffffff, 0x5423, &(0x7f0000000000)) 08:22:12 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}]}) 08:22:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(0xffffffffffffffff, 0x5423, &(0x7f0000000000)) 08:22:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x4) 08:22:12 executing program 2: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)) 08:22:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@ptr={0xe}]}, {0x0, [0x7f, 0x2e, 0x0, 0x7f, 0x6f, 0x61]}}, &(0x7f0000000180)=""/149, 0x2c, 0x95, 0x1}, 0x20) [ 166.114386] ISOFS: Unable to identify CD-ROM format. 08:22:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(0xffffffffffffffff, 0x5423, &(0x7f0000000000)) [ 166.169878] sctp: [Deprecated]: syz-executor.5 (pid 8796) Use of int in maxseg socket option. [ 166.169878] Use struct sctp_assoc_value instead 08:22:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x4048ae9b, 0x400000) [ 166.258553] sctp: [Deprecated]: syz-executor.5 (pid 8805) Use of int in maxseg socket option. [ 166.258553] Use struct sctp_assoc_value instead 08:22:12 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = dup(r0) ioctl$VT_ACTIVATE(r1, 0x10, 0x0) 08:22:12 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}]}) 08:22:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000b00)=ANY=[@ANYBLOB="7f454c4602706a5ce1a2ee467d3bca22f507643a066104010000000000000c02000000000000a6d10000030007000200ffffffff468051e57464030000000300000000000100bc08000000009e50f9ffff04000000ffff7f0000000000000600000000000000000800000000000005000092ac0000006f000000000000000000000000000000ea2b000000000000080000000000000003000000000000000800000000000000f8d1cf6bb60a3cc8252c025b5f92a84bb4d5efd7201c0b3858f135eeae37c7f0e87b4c"], 0xc9) shutdown(r0, 0x1) 08:22:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:12 executing program 5: symlink(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='./file1\x00') mkdir(&(0x7f0000000100)='./file1/file0\x00', 0x0) 08:22:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = dup3(r1, r0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000200)=@assoc_value, 0x8) 08:22:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) [ 166.457818] ISOFS: Unable to identify CD-ROM format. 08:22:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000200)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000b40)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 08:22:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:12 executing program 1: prctl$PR_SET_KEEPCAPS(0x8, 0x0) link(&(0x7f0000000200)='./bus\x00', &(0x7f00000002c0)='./bus\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0xffffffffffdffffe) sendto$packet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000440)=ANY=[@ANYPTR], 0x8) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000380)='./bus\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f0000000580)={'U-', 0x7}, 0x28, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) creat(&(0x7f0000000140)='./bus\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 08:22:12 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}]}) 08:22:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:12 executing program 2: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 08:22:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:12 executing program 0: io_setup(0x0, &(0x7f0000000680)) socket$bt_hidp(0x1f, 0x3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x4, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000340)={{0xa, 0x4e22, 0x3, @rand_addr="6a4d3d823ebf3e8dc911b3e1481704cb"}, {0xa, 0x4e23, 0x3, @mcast2, 0xd6}, 0x0, [0x0, 0x401, 0x859, 0x80000001, 0x3, 0x5, 0x3f, 0xfffffffffffffffc]}, 0x5c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) fcntl$lock(r0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x6}) keyctl$read(0xb, 0x0, &(0x7f0000000580)=""/76, 0x4c) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000006c0)={{0xc, @remote, 0x4e20, 0x0, 'lblc\x00', 0x0, 0x7f, 0x1a}, {@local, 0x4e22, 0x0, 0x101, 0x1, 0x7f}}, 0x44) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0xde8, 0x3, 0x1, 0x5}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800), &(0x7f0000000840)=0x9) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000000) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, 0x0, &(0x7f0000000480)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000400)="6dae6e24be827c8639931b22c07c04facc271cfcac6c18034d626b920f44e1ae9e697b1be5969c505391ababe7be6fff3ba8dec23d44f48590acff3383ec0cb39d4909809ff024e4a37a5e1f7ac211964d83") 08:22:12 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r0, 0x5423, &(0x7f0000000000)) [ 166.659404] audit: type=1804 audit(1560932532.869:52): pid=8853 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir651305366/syzkaller.hapBDx/86/bus" dev="sda1" ino=16711 res=1 [ 166.702203] ISOFS: Unable to identify CD-ROM format. 08:22:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000104253e7adafd848115173b96c8edf2"], 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:22:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:13 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r0, 0x5423, &(0x7f0000000000)) [ 166.777080] audit: type=1804 audit(1560932532.959:53): pid=8865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir651305366/syzkaller.hapBDx/86/bus" dev="sda1" ino=16711 res=1 08:22:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:13 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}]}) [ 167.430108] audit: type=1804 audit(1560932533.639:54): pid=8865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir651305366/syzkaller.hapBDx/86/bus" dev="sda1" ino=16711 res=1 [ 167.457301] audit: type=1804 audit(1560932533.669:55): pid=8893 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir651305366/syzkaller.hapBDx/86/bus" dev="sda1" ino=16711 res=1 [ 167.485422] audit: type=1804 audit(1560932533.699:56): pid=8893 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir651305366/syzkaller.hapBDx/86/bus" dev="sda1" ino=16711 res=1 08:22:13 executing program 5: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:13 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r0, 0x5423, &(0x7f0000000000)) 08:22:13 executing program 1: prctl$PR_SET_KEEPCAPS(0x8, 0x0) link(&(0x7f0000000200)='./bus\x00', &(0x7f00000002c0)='./bus\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0xffffffffffdffffe) sendto$packet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000440)=ANY=[@ANYPTR], 0x8) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000380)='./bus\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f0000000580)={'U-', 0x7}, 0x28, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) creat(&(0x7f0000000140)='./bus\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 08:22:13 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}]}) 08:22:13 executing program 0: mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x841, 0x0) 08:22:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") rt_sigqueueinfo(0x0, 0x18, &(0x7f0000000600)={0x0, 0x0, 0x10000003}) [ 167.533354] audit: type=1804 audit(1560932533.749:57): pid=8865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir651305366/syzkaller.hapBDx/86/bus" dev="sda1" ino=16711 res=1 08:22:13 executing program 0: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 08:22:13 executing program 5: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:13 executing program 2: [ 167.628940] audit: type=1804 audit(1560932533.839:58): pid=8908 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir651305366/syzkaller.hapBDx/87/bus" dev="sda1" ino=16716 res=1 08:22:13 executing program 0: 08:22:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:14 executing program 2: [ 167.817148] audit: type=1804 audit(1560932533.929:59): pid=8913 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir651305366/syzkaller.hapBDx/87/bus" dev="sda1" ino=16716 res=1 08:22:14 executing program 1: futex(&(0x7f0000004000), 0x400000085, 0x0, 0x0, &(0x7f0000004000), 0x401ffffffe) 08:22:14 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}]}) 08:22:14 executing program 5: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:14 executing program 0: 08:22:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:14 executing program 2: 08:22:14 executing program 0: 08:22:14 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}]}) 08:22:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:14 executing program 5: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:14 executing program 2: 08:22:14 executing program 1: 08:22:14 executing program 0: 08:22:14 executing program 0: 08:22:14 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}]}) 08:22:14 executing program 0: 08:22:14 executing program 5: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:14 executing program 1: 08:22:14 executing program 2: 08:22:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:14 executing program 0: 08:22:14 executing program 2: 08:22:14 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}]}) 08:22:14 executing program 1: 08:22:14 executing program 5: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:15 executing program 0: 08:22:15 executing program 1: 08:22:15 executing program 2: 08:22:15 executing program 5: syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:15 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:15 executing program 2: 08:22:15 executing program 1: 08:22:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:15 executing program 0: 08:22:15 executing program 2: 08:22:15 executing program 5: syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:15 executing program 1: 08:22:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:15 executing program 0: [ 169.031081] ISOFS: Unable to identify CD-ROM format. 08:22:15 executing program 2: 08:22:15 executing program 1: 08:22:15 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:15 executing program 5: syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:15 executing program 2: 08:22:15 executing program 0: 08:22:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:15 executing program 1: 08:22:15 executing program 2: 08:22:15 executing program 0: 08:22:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, 0x0) 08:22:15 executing program 1: 08:22:15 executing program 2: 08:22:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) [ 169.288304] ISOFS: Unable to identify CD-ROM format. 08:22:15 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:15 executing program 0: 08:22:15 executing program 2: 08:22:15 executing program 1: 08:22:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, 0x0) 08:22:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:15 executing program 0: 08:22:15 executing program 2: 08:22:15 executing program 1: 08:22:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, 0x0) 08:22:15 executing program 2: [ 169.552896] ISOFS: Unable to identify CD-ROM format. 08:22:15 executing program 0: 08:22:15 executing program 2: 08:22:15 executing program 1: 08:22:15 executing program 0: 08:22:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:15 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}]}) 08:22:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:15 executing program 0: 08:22:15 executing program 2: 08:22:15 executing program 1: 08:22:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) [ 169.787255] ISOFS: Unable to identify CD-ROM format. 08:22:16 executing program 0: 08:22:16 executing program 2: 08:22:16 executing program 1: 08:22:16 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}]}) 08:22:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) 08:22:16 executing program 2: 08:22:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:16 executing program 0: 08:22:16 executing program 1: 08:22:16 executing program 2: 08:22:16 executing program 0: 08:22:16 executing program 1: 08:22:16 executing program 5: 08:22:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) [ 170.056271] ISOFS: Unable to identify CD-ROM format. 08:22:16 executing program 0: 08:22:16 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@nocompress='nocompress'}]}) 08:22:16 executing program 2: 08:22:16 executing program 1: 08:22:16 executing program 5: 08:22:16 executing program 0: 08:22:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:16 executing program 2: 08:22:16 executing program 5: 08:22:16 executing program 1: 08:22:16 executing program 0: 08:22:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:16 executing program 0: [ 170.302835] ISOFS: Unable to identify CD-ROM format. 08:22:16 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@check_relaxed='check=relaxed'}]}) 08:22:16 executing program 1: 08:22:16 executing program 2: 08:22:16 executing program 5: 08:22:16 executing program 0: 08:22:16 executing program 5: 08:22:16 executing program 1: 08:22:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:16 executing program 2: 08:22:16 executing program 0: 08:22:16 executing program 2: [ 170.537932] ISOFS: Unable to identify CD-ROM format. 08:22:16 executing program 0: 08:22:16 executing program 5: 08:22:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:16 executing program 1: 08:22:16 executing program 2: 08:22:16 executing program 0: 08:22:16 executing program 1: 08:22:16 executing program 2: 08:22:16 executing program 1: 08:22:16 executing program 0: 08:22:16 executing program 5: 08:22:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) 08:22:17 executing program 5: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000100)) 08:22:17 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:17 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, 0x0, 0x0) 08:22:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000000)) 08:22:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xc018ae85, 0x0) 08:22:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(0xffffffffffffffff, 0x5423, &(0x7f0000000000)) 08:22:17 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:17 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x689}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x4, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000000000, 0x0, 0x0, 0x0, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2}}}}}}}, 0x0) 08:22:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:22:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(0xffffffffffffffff, 0x5423, &(0x7f0000000000)) 08:22:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:17 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c2dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x2, 0x1, 0x30}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 08:22:17 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000240)="f6", 0x1}], 0x1) 08:22:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r1, 0x4}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'ghash\x00'}}, &(0x7f0000000300)="e1470502", 0x0) 08:22:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(0xffffffffffffffff, 0x5423, &(0x7f0000000000)) 08:22:17 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup2(r0, r0) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x81) 08:22:18 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff000}, {0x80000006}]}, 0x10) 08:22:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, 0x0) 08:22:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, 0x0, 0x0, 0x0, 0x0) 08:22:18 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:18 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x4, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:18 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, 0x0) 08:22:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") 08:22:18 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xfffffffffffffd0a) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0xfffffffffffffebe) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10800000013, &(0x7f0000000100)=0x1, 0x4) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x9fc1) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffe2a) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000700)={0xffffffffffffffff, 0x40000007fff, 0x80000001}, 0x14) shutdown(r0, 0x1) 08:22:18 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x4, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:18 executing program 2: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$TCSETSF(r1, 0x5423, 0x0) 08:22:18 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x4, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:18 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 08:22:18 executing program 2: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x412}, {r1, 0x2000}, {r0}], 0x3, 0x401) 08:22:18 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x0) 08:22:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x4, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:18 executing program 2: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x400000000006, 0x0, 0x0, 0x50000}]}) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) write$P9_RLOPEN(r0, 0x0, 0xffffffffffffff9e) 08:22:18 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 08:22:18 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 08:22:18 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'veth0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r3}, 0x14) 08:22:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 08:22:18 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) 08:22:18 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:18 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='fuseblk\x00', 0x0, 0x0) 08:22:18 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 08:22:18 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 08:22:18 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:18 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:19 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) 08:22:19 executing program 4: socket$inet6_udp(0x1c, 0x2, 0x0) poll(&(0x7f0000000140), 0x17, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x24f, 0x0, 0x0, 0x800e004de) poll(0x0, 0x0, 0x101) shutdown(r0, 0x0) 08:22:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x0, 0x43, &(0x7f0000000080)={0x2, 0xffffffffffffffff}, 0x10) recvfrom$inet(r0, 0x0, 0x6ccf, 0x0, 0x0, 0x800e00938) shutdown(r0, 0x0) 08:22:19 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:19 executing program 3: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:19 executing program 3: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:19 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:19 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) 08:22:19 executing program 3: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setown(r0, 0x6, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00305) 08:22:19 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:19 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000140), 0x17, 0x8000000000049) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x24f, 0x0, 0x0, 0x800e004de) poll(&(0x7f0000000080)=[{r0, 0x162}, {}], 0x2, 0xffffffff) shutdown(r1, 0x0) 08:22:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:19 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) 08:22:19 executing program 3: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:19 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:19 executing program 3: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:19 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:19 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 08:22:19 executing program 3: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) 08:22:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) [ 173.934843] binder: 9511:9514 ioctl c0306201 0 returned -14 08:22:20 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpu.stat\x00', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xffffff39) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8910, &(0x7f0000000000)) 08:22:20 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:20 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 08:22:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 08:22:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet6(0xa, 0x0, 0x0) openat(r0, 0x0, 0x0, 0x0) 08:22:20 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0b") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) [ 174.210517] binder: 9526:9530 ioctl c0306201 0 returned -14 08:22:20 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 08:22:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 08:22:20 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpu.stat\x00', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xffffff39) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8910, &(0x7f0000000000)) 08:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0b") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:20 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpu.stat\x00', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xffffff39) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8910, &(0x7f0000000000)) 08:22:20 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 174.333262] binder: 9544:9546 ioctl c0306201 0 returned -14 08:22:20 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:20 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpu.stat\x00', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xffffff39) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8910, &(0x7f0000000000)) 08:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0b") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7b") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:20 executing program 4: socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 08:22:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={{0x0, 0x2710}}) 08:22:20 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:20 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") syz_open_procfs$namespace(0x0, &(0x7f0000000800)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') [ 174.559718] audit: type=1400 audit(1560932540.769:60): avc: denied { map } for pid=9573 comm="syz-executor.1" path="socket:[35054]" dev="sockfs" ino=35054 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=udp_socket permissive=1 08:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7b") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7b") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:20 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfec7be070") r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfe}, {0x80000006}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 08:22:20 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:20 executing program 4: socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 08:22:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be0") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:21 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}]}, 0x40}}, 0x0) 08:22:21 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:21 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) [ 174.790329] protocol 88fb is buggy, dev hsr_slave_0 [ 174.795669] protocol 88fb is buggy, dev hsr_slave_1 08:22:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be0") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:21 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), 0x4, 0x0, &(0x7f0000000140)="fb6bf925"}) 08:22:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be0") keyctl$KEYCTL_PKEY_VERIFY(0x7, &(0x7f0000000240), 0x0, 0x0, 0x0) 08:22:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 174.955537] audit: type=1326 audit(1560932541.169:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9630 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c10a code=0xffff0000 [ 175.030148] protocol 88fb is buggy, dev hsr_slave_0 [ 175.035298] protocol 88fb is buggy, dev hsr_slave_1 08:22:21 executing program 1: 08:22:21 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}]}, 0x40}}, 0x0) 08:22:21 executing program 5: socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:21 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 08:22:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, 0x0, 0x0, 0x0, 0x0) 08:22:21 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 08:22:21 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}]}, 0x40}}, 0x0) 08:22:21 executing program 5: socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:21 executing program 1: 08:22:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, 0x0, 0x0, 0x0, 0x0) 08:22:21 executing program 1: [ 175.739193] audit: type=1326 audit(1560932541.949:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9630 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c10a code=0xffff0000 08:22:22 executing program 4: 08:22:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") keyctl$KEYCTL_PKEY_VERIFY(0x7, 0x0, 0x0, 0x0, 0x0) 08:22:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 08:22:22 executing program 5: socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:22 executing program 1: 08:22:22 executing program 1: 08:22:22 executing program 0: 08:22:22 executing program 4: 08:22:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, &(0x7f0000000140)}) 08:22:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:22 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:22 executing program 4: 08:22:22 executing program 0: 08:22:22 executing program 1: 08:22:22 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:22 executing program 4: 08:22:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, &(0x7f0000000140)}) 08:22:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:22 executing program 0: 08:22:22 executing program 1: 08:22:22 executing program 4: 08:22:22 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:22 executing program 0: 08:22:22 executing program 1: 08:22:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, &(0x7f0000000140)}) 08:22:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 08:22:22 executing program 1: 08:22:22 executing program 0: 08:22:22 executing program 4: 08:22:22 executing program 5: socketpair(0x1, 0x2000000003, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:22 executing program 1: 08:22:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 08:22:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x2, 0x0, &(0x7f0000000140)="fb6b"}) 08:22:22 executing program 0: 08:22:22 executing program 4: 08:22:22 executing program 1: 08:22:22 executing program 5: socketpair(0x1, 0x2000000003, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:22 executing program 0: 08:22:22 executing program 4: 08:22:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x2, 0x0, &(0x7f0000000140)="fb6b"}) 08:22:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 08:22:22 executing program 1: 08:22:22 executing program 4: 08:22:22 executing program 0: 08:22:22 executing program 1: 08:22:22 executing program 5: socketpair(0x1, 0x2000000003, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x2, 0x0, &(0x7f0000000140)="fb6b"}) 08:22:22 executing program 4: 08:22:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) 08:22:22 executing program 0: 08:22:22 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:22 executing program 1: 08:22:22 executing program 4: 08:22:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x3, 0x0, &(0x7f0000000140)="fb6bf9"}) 08:22:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) 08:22:22 executing program 0: 08:22:22 executing program 1: 08:22:22 executing program 4: 08:22:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) 08:22:22 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x3, 0x0, &(0x7f0000000140)="fb6bf9"}) 08:22:23 executing program 0: 08:22:23 executing program 4: 08:22:23 executing program 1: 08:22:23 executing program 0: 08:22:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x3, 0x0, &(0x7f0000000140)="fb6bf9"}) 08:22:23 executing program 4: 08:22:23 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r1) 08:22:23 executing program 0: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x4000, &(0x7f0000000180)) 08:22:23 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0xffffffff, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000000)={0x100000000001, 0x0, {0x0, 0x0, 0x2004}}) 08:22:23 executing program 4: add_key$user(&(0x7f0000002300)='user\x00', &(0x7f0000001240)={'syz'}, &(0x7f0000001280)="d9", 0x1, 0xfffffffffffffffb) 08:22:23 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:23 executing program 3: 08:22:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:23 executing program 3: 08:22:23 executing program 0: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x4000, &(0x7f0000000180)) 08:22:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x9}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:22:23 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x80000) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000005c0)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x1000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xe, 0x0, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f00000000c0)={0x3, "fbe69808800b234a7e3c55ddb1438880856eb729c7d28566d752a0bfd4c7c45f", 0x4, 0x20, 0x0, 0x1, 0x4, 0x2, 0xffff, 0x2}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) 08:22:23 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:23 executing program 3: socket$isdn(0x22, 0x3, 0x23) 08:22:23 executing program 4: add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000002400)={'syz'}, &(0x7f0000002440)="e4", 0x1, 0xfffffffffffffffc) 08:22:23 executing program 0: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x4000, &(0x7f0000000180)) 08:22:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 08:22:23 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:23 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:23 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 08:22:23 executing program 0: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x4000, &(0x7f0000000180)) 08:22:23 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:23 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:23 executing program 0: r0 = getpgid(0x0) rt_tgsigqueueinfo(r0, 0x0, 0x4000, &(0x7f0000000180)) 08:22:23 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f00000000c0)) 08:22:23 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 08:22:23 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x80000) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000005c0)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x1000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xe, 0x0, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f00000000c0)={0x3, "fbe69808800b234a7e3c55ddb1438880856eb729c7d28566d752a0bfd4c7c45f", 0x4, 0x20, 0x0, 0x1, 0x4, 0x2, 0xffff, 0x2}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) 08:22:23 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:23 executing program 0: r0 = getpgid(0x0) rt_tgsigqueueinfo(r0, 0x0, 0x4000, &(0x7f0000000180)) 08:22:23 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:23 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f00000000c0)) 08:22:23 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 08:22:23 executing program 0: r0 = getpgid(0x0) rt_tgsigqueueinfo(r0, 0x0, 0x4000, &(0x7f0000000180)) 08:22:23 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f00000000c0)) 08:22:23 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:24 executing program 0: r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x4000, &(0x7f0000000180)) 08:22:24 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f00000000c0)) 08:22:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) 08:22:24 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file1\x00') 08:22:24 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x80000) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000005c0)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x1000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xe, 0x0, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f00000000c0)={0x3, "fbe69808800b234a7e3c55ddb1438880856eb729c7d28566d752a0bfd4c7c45f", 0x4, 0x20, 0x0, 0x1, 0x4, 0x2, 0xffff, 0x2}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246) 08:22:24 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:24 executing program 0: r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x4000, &(0x7f0000000180)) 08:22:24 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x80000080044d76, &(0x7f00000000c0)) 08:22:24 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x80000080044d76, &(0x7f00000000c0)) 08:22:24 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @ipv4}}}, 0x88) 08:22:24 executing program 0: r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x4000, &(0x7f0000000180)) 08:22:24 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file1\x00') 08:22:24 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 08:22:24 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x80000080044d76, &(0x7f00000000c0)) 08:22:24 executing program 1: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7}) 08:22:24 executing program 0: getpgid(0x0) r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x4000, &(0x7f0000000180)) 08:22:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000), 0x8) 08:22:24 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, 0x0) 08:22:24 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file1\x00') 08:22:24 executing program 4: r0 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f00000000c0)) 08:22:24 executing program 0: getpgid(0x0) r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x4000, &(0x7f0000000180)) 08:22:24 executing program 1: rt_sigqueueinfo(0x0, 0x6, &(0x7f0000000080)={0x0, 0x0, 0x3}) 08:22:24 executing program 0: getpgid(0x0) r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x4000, &(0x7f0000000180)) 08:22:24 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, 0x0) 08:22:24 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 08:22:24 executing program 4: r0 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f00000000c0)) 08:22:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x200, 0x4, 0x20000000001009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 08:22:24 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) setxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, 0x0) 08:22:24 executing program 0: r0 = getpgid(0x0) gettid() rt_tgsigqueueinfo(r0, 0x0, 0x4000, &(0x7f0000000180)) 08:22:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") getdents(0xffffffffffffffff, 0x0, 0x0) 08:22:24 executing program 4: r0 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f00000000c0)) 08:22:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) ppoll(&(0x7f0000000380)=[{r0}], 0x1, &(0x7f00000003c0), 0x0, 0x0) 08:22:24 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:24 executing program 1: r0 = inotify_init1(0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 08:22:24 executing program 0: r0 = getpgid(0x0) gettid() rt_tgsigqueueinfo(r0, 0x0, 0x4000, &(0x7f0000000180)) 08:22:24 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f00000000c0)) 08:22:24 executing program 5: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd9", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x0, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739db", 0x15, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000", 0x15}], 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r2, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) 08:22:25 executing program 2: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r3, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:25 executing program 0: r0 = getpgid(0x0) gettid() rt_tgsigqueueinfo(r0, 0x0, 0x4000, &(0x7f0000000180)) 08:22:25 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:25 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f00000000c0)) 08:22:25 executing program 0: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000180)) 08:22:25 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@getsa={0x28, 0x12, 0x1}, 0x28}, 0x8}, 0x0) [ 178.879819] loop5: unable to read partition table 08:22:25 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f00000000c0)) [ 178.917120] loop5: partition table beyond EOD, truncated [ 178.939381] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 178.951630] loop2: unable to read partition table 08:22:25 executing program 0: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000180)) 08:22:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) read(r1, &(0x7f0000001440)=""/184, 0xb8) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r1, 0x0, 0x80003) 08:22:25 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') [ 178.977186] loop2: partition table beyond EOD, truncated [ 179.007209] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 08:22:25 executing program 4: syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x80000080044d76, &(0x7f00000000c0)) 08:22:25 executing program 0: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000180)) 08:22:25 executing program 2: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r3, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:25 executing program 5: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd9", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x0, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739db", 0x15, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000", 0x15}], 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r2, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) 08:22:25 executing program 4: syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x80000080044d76, &(0x7f00000000c0)) 08:22:25 executing program 0: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x4000, 0x0) 08:22:25 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:25 executing program 0: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x4000, 0x0) 08:22:25 executing program 4: syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x80000080044d76, &(0x7f00000000c0)) 08:22:25 executing program 0: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x4000, 0x0) 08:22:25 executing program 5: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd9", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x0, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739db", 0x15, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000", 0x15}], 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r2, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) 08:22:25 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r3, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:25 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x0, &(0x7f00000000c0)) 08:22:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x200, 0x4, 0x20000000001009}, 0x3c) 08:22:25 executing program 0: get_mempolicy(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000ff9000/0x1000)=nil, 0x4) 08:22:25 executing program 2: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r3, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:25 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x0, &(0x7f00000000c0)) 08:22:25 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') [ 179.586569] loop1: unable to read partition table [ 179.599822] loop1: partition table beyond EOD, truncated [ 179.615613] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:22:25 executing program 5: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd9", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x0, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739db", 0x15, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000", 0x15}], 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r2, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) 08:22:25 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname$inet(r0, 0x0, &(0x7f00000001c0)=0xffffffffffffffe8) 08:22:26 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x0, &(0x7f00000000c0)) 08:22:26 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r3, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:26 executing program 2: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r3, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value, 0x0) 08:22:26 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, 0x0) 08:22:26 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eea, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) accept4$x25(r1, &(0x7f0000000080)={0x9, @remote}, &(0x7f00000000c0)=0x12, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) lookup_dcookie(0x6, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x101201) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000deaea5b164ce319b8197ea064000ffffffff0000000000000000880b0000000000003800210000000000000000d6"], 0x34) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x2, &(0x7f0000000240)={0x0}) 08:22:26 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, 0x0) 08:22:26 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r3, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) [ 180.084990] device bridge_slave_1 left promiscuous mode [ 180.096482] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.157762] device bridge_slave_0 left promiscuous mode [ 180.172387] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.315209] device hsr_slave_1 left promiscuous mode [ 180.357225] device hsr_slave_0 left promiscuous mode [ 180.397972] team0 (unregistering): Port device team_slave_1 removed [ 180.432534] team0 (unregistering): Port device team_slave_0 removed [ 180.457582] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 180.519814] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 180.607043] bond0 (unregistering): Released all slaves [ 183.200156] IPVS: ftp: loaded support on port[0] = 21 [ 183.553001] IPVS: ftp: loaded support on port[0] = 21 [ 183.578256] chnl_net:caif_netlink_parms(): no params data found [ 183.642228] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.648639] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.655524] device bridge_slave_0 entered promiscuous mode [ 183.662883] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.669231] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.676251] device bridge_slave_1 entered promiscuous mode [ 183.698120] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.714398] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.746229] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 183.753561] team0: Port device team_slave_0 added [ 183.775439] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.782482] team0: Port device team_slave_1 added [ 183.788439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.795778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.873986] device hsr_slave_0 entered promiscuous mode [ 183.910458] device hsr_slave_1 entered promiscuous mode [ 183.950386] chnl_net:caif_netlink_parms(): no params data found [ 183.959928] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 183.966895] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 184.016769] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.023165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.029739] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.036114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.044673] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.051399] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.058255] device bridge_slave_0 entered promiscuous mode [ 184.069719] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.076364] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.083645] device bridge_slave_1 entered promiscuous mode [ 184.104232] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.115786] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.134553] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.141945] team0: Port device team_slave_0 added [ 184.147579] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.155157] team0: Port device team_slave_1 added [ 184.165556] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 184.173766] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 184.232655] device hsr_slave_0 entered promiscuous mode [ 184.280285] device hsr_slave_1 entered promiscuous mode [ 184.341926] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 184.355729] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 184.373648] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.380065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.386734] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.393109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.416091] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 184.422427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.435350] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.452265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.459213] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.466594] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.475015] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.482216] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.492120] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 184.502898] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.515893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.523471] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.529906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.543675] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 184.553110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.561544] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.567896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.576666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.585872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.599087] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.609455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.619427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.628742] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.635907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.643653] device bridge_slave_1 left promiscuous mode [ 184.649133] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.700705] device bridge_slave_0 left promiscuous mode [ 184.706196] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.794411] device hsr_slave_1 left promiscuous mode [ 184.833955] device hsr_slave_0 left promiscuous mode [ 184.874621] team0 (unregistering): Port device team_slave_1 removed [ 184.884170] team0 (unregistering): Port device team_slave_0 removed [ 184.894483] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 184.935128] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 184.996009] bond0 (unregistering): Released all slaves [ 185.045017] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.051470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.059178] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.066724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.073762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.082736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.090416] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.097307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.105375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.115619] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 185.127983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 185.136249] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 185.144424] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.150694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.158199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.166491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.174146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.189080] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 185.195402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.204475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.213395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.221276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.228777] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.235146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.281484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.290173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.297902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.305596] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.311974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.320680] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 185.329528] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.338029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.345520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.368647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.382787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.397668] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 185.414491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.423288] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.437527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.445474] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.456392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.474870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.487600] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 185.498507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.507657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.522303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 185.536933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.546354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.559420] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 185.570214] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.605111] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 185.624985] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.700957] loop5: unable to read partition table [ 185.706246] loop5: partition table beyond EOD, truncated [ 185.720135] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 08:22:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x800000000080000, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x1) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x40000000, 'c\x86\xdd'}]}, 0xfdef) 08:22:32 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:32 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044d76, 0x0) 08:22:32 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r2, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) 08:22:32 executing program 0: memfd_create(0x0, 0x6) r0 = syz_open_dev$dspn(0x0, 0xffffffff80000001, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) gettid() r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) write$P9_RWRITE(r0, &(0x7f0000000080)={0xb, 0x77, 0x2, 0x925}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f00000005c0)={0xa0, 0x0, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, {0x0, 0x80000001, 0x807c, 0x6, 0x0, 0x2, 0x0, 0x0, 0xcb1}}}}, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000500)) close(r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) prctl$PR_GET_DUMPABLE(0x3) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, 0x0, &(0x7f0000000200)) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x802) 08:22:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x10000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x4, 0x30}, 0xc) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1) 08:22:33 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000080)={0x9}) 08:22:33 executing program 3: mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:33 executing program 0: memfd_create(0x0, 0x6) r0 = syz_open_dev$dspn(0x0, 0xffffffff80000001, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) gettid() r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) write$P9_RWRITE(r0, &(0x7f0000000080)={0xb, 0x77, 0x2, 0x925}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f00000005c0)={0xa0, 0x0, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, {0x0, 0x80000001, 0x807c, 0x6, 0x0, 0x2, 0x0, 0x0, 0xcb1}}}}, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000500)) close(r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) prctl$PR_GET_DUMPABLE(0x3) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, 0x0, &(0x7f0000000200)) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x802) 08:22:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) semget(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x0, 0x3fa}) getuid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlockall() [ 186.981419] loop2: unable to read partition table [ 186.986423] loop2: partition table beyond EOD, truncated [ 186.992324] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 08:22:33 executing program 3: mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001640)=[{&(0x7f00000001c0)=""/218, 0xda}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x9081, 0x0, 0x0, 0x800e00496) shutdown(r1, 0x0) select(0x14, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 08:22:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x5d, &(0x7f0000000040)="0e097e6c", 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) r1 = dup2(r0, r0) sendmsg$unix(r1, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e007d6) 08:22:33 executing program 3: mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:33 executing program 2: r0 = socket$inet(0x2, 0x5000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000500)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0xffffffffffefffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="8bd4c32bdc98f333616db78d47f946397114c62c417689fc3aa6791df16c35cc14a966aa04edac0c66e107ddd0708c0a938ed2c2c76245ca5559325fcab81a2c19c12b857c0bdac24e2d2816d8399926790d707f53f8faad5183ecf73e8536ae8896ace02837a709bf95a221ea18d5a642a4f0d0578b7e42036f10fd3b70c03f76e6", 0x82}], 0x1}, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/63, 0x3f}], 0x1}, 0x0) r1 = gettid() tkill(r1, 0x14) [ 188.170197] IPVS: ftp: loaded support on port[0] = 21 [ 188.479544] chnl_net:caif_netlink_parms(): no params data found [ 188.515053] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.521556] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.529186] device bridge_slave_0 entered promiscuous mode [ 188.548234] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.559531] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.567509] device bridge_slave_1 entered promiscuous mode [ 188.601756] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 188.610793] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 188.627120] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 188.634770] team0: Port device team_slave_0 added [ 188.640992] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 188.647990] team0: Port device team_slave_1 added [ 188.656658] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 188.664497] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 188.722078] device hsr_slave_0 entered promiscuous mode [ 188.760348] device hsr_slave_1 entered promiscuous mode [ 188.810704] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 188.817685] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 188.835927] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.862590] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.870879] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.882911] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.889339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.898695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.907594] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 188.913995] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.924994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 188.932434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.940223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.947720] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.954086] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.961835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.971091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 188.978143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.986717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.994399] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.000782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.013098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 189.019899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.030547] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 189.037448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.049986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 189.056951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.064794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.073144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.087643] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 189.094551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.102886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.115372] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 189.125316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 189.135752] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 189.142361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.149837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.157789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.171893] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 189.181541] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.560996] device bridge_slave_1 left promiscuous mode [ 189.566485] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.620923] device bridge_slave_0 left promiscuous mode [ 189.629372] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.660862] loop1: unable to read partition table [ 189.665883] loop1: partition table beyond EOD, truncated [ 189.671884] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 189.679263] device bridge_slave_1 left promiscuous mode [ 189.689770] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.731153] device bridge_slave_0 left promiscuous mode [ 189.736650] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.872453] device hsr_slave_1 left promiscuous mode [ 189.913043] device hsr_slave_0 left promiscuous mode [ 189.953068] team0 (unregistering): Port device team_slave_1 removed [ 189.963357] team0 (unregistering): Port device team_slave_0 removed [ 189.972688] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 189.994014] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 190.094873] bond0 (unregistering): Released all slaves [ 190.182645] device hsr_slave_1 left promiscuous mode [ 190.223579] device hsr_slave_0 left promiscuous mode [ 190.263168] team0 (unregistering): Port device team_slave_1 removed [ 190.273767] team0 (unregistering): Port device team_slave_0 removed [ 190.284142] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 190.313859] bond0 (unregistering): Releasing backup interface bond_slave_0 08:22:36 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r2, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) 08:22:36 executing program 4: r0 = socket$unix(0x1, 0x1000000805, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = dup2(r0, r1) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:36 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:36 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x4402) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b3a97f804689687436a08c1dbebc0f629bf3b2f4aa80c78dd10b2ed19cb5e3af92739ebf2ece3c2a74c3b2f6fdffffff288f1c2d1f0b53cd7f9f21c32e1dff3b", "baa5dcb633c13e7eb078eb09282d4fbfd37dab10c874a7f78c39f39b341a3bb3936c5351b69bf9a353ee727ef4e61e0442a44665cc81d390a636dd73333ac601", "8da3dc7692a6a2d983ecfaa7044bef9cb2d500"}) [ 190.395491] bond0 (unregistering): Released all slaves 08:22:36 executing program 0: r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ftruncate(r0, 0x8200) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x1000004e23, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) readahead(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) accept$packet(0xffffffffffffffff, 0x0, 0x0) lstat(0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) keyctl$clear(0x7, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000040), 0x4) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x880002, 0x12, r1, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 08:22:36 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') [ 190.523521] audit: type=1804 audit(1560932556.739:63): pid=10251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir037971897/syzkaller.K6m3xv/194/bus" dev="sda1" ino=16828 res=1 [ 190.655257] audit: type=1804 audit(1560932556.869:64): pid=10255 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir037971897/syzkaller.K6m3xv/194/bus" dev="sda1" ino=16828 res=1 [ 191.319367] audit: type=1804 audit(1560932557.529:65): pid=10254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir037971897/syzkaller.K6m3xv/194/bus" dev="sda1" ino=16828 res=1 [ 191.360916] audit: type=1804 audit(1560932557.529:66): pid=10255 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir037971897/syzkaller.K6m3xv/194/bus" dev="sda1" ino=16828 res=1 [ 193.780267] IPVS: ftp: loaded support on port[0] = 21 [ 194.123344] IPVS: ftp: loaded support on port[0] = 21 [ 194.139975] chnl_net:caif_netlink_parms(): no params data found [ 194.211203] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.217650] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.224751] device bridge_slave_0 entered promiscuous mode [ 194.234489] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.240999] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.247794] device bridge_slave_1 entered promiscuous mode [ 194.272221] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.285367] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.306442] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 194.314750] team0: Port device team_slave_0 added [ 194.320469] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 194.327631] team0: Port device team_slave_1 added [ 194.333274] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 194.340694] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 194.413288] device hsr_slave_0 entered promiscuous mode [ 194.450293] device hsr_slave_1 entered promiscuous mode [ 194.513283] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 194.538887] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 194.554527] chnl_net:caif_netlink_parms(): no params data found [ 194.583951] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.590369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.597011] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.603406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.642741] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.649148] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.657306] device bridge_slave_0 entered promiscuous mode [ 194.665294] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.672074] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.679172] device bridge_slave_1 entered promiscuous mode [ 194.703580] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.713304] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.736420] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 194.743858] team0: Port device team_slave_0 added [ 194.749729] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 194.757139] team0: Port device team_slave_1 added [ 194.762433] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 194.772473] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 194.833849] device hsr_slave_0 entered promiscuous mode [ 194.872260] device hsr_slave_1 entered promiscuous mode [ 194.910960] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 194.922501] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 194.945527] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 194.952077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.958565] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.964926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.971579] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.977914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.993706] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 195.009844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.016866] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.024291] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.032936] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.039479] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.048624] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 195.055131] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.068921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.077336] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.083688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.099258] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.107189] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.113569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.126800] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 195.138403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 195.147166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.154943] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.163517] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.175749] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.184027] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 195.192026] device bridge_slave_1 left promiscuous mode [ 195.197517] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.230575] device bridge_slave_0 left promiscuous mode [ 195.236029] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.362558] device hsr_slave_1 left promiscuous mode [ 195.433494] device hsr_slave_0 left promiscuous mode [ 195.492739] team0 (unregistering): Port device team_slave_1 removed [ 195.504068] team0 (unregistering): Port device team_slave_0 removed [ 195.513297] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 195.555151] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 195.623740] bond0 (unregistering): Released all slaves [ 195.672366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.679950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.689820] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 195.701020] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 195.708952] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 195.715226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.723115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.730667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.737448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.747365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 195.758887] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 195.765062] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.773638] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.780803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.788244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.798398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.806150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.813837] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.820221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.829035] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 195.835626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.844780] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 195.853386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.853728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.868746] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.875215] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.886195] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 195.896684] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 195.906418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 195.915467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.923582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.933851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 195.943220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.951298] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.963106] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 195.972716] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 195.979439] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.986567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.994630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.002205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.009542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.018990] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.029071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 196.036777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.044458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.054719] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 196.065317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.082458] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 196.093911] 8021q: adding VLAN 0 to HW filter on device batadv0 08:22:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={0x0, r0}, 0x10) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x1d0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = gettid() write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)=r0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x6) r4 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xe5f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xe4, 0x0, 0x0, 0x100000000, 0x0, 0x8, 0x0, 0x7, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1a7}, r3, 0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x4040, 0x0) close(r2) perf_event_open(&(0x7f0000000b40)={0x7, 0x70, 0xff, 0x0, 0x10001, 0x3a3c, 0x0, 0x7ff, 0x200, 0x0, 0x0, 0x5, 0xff, 0x3ff, 0x0, 0x0, 0x280, 0x2, 0x0, 0x7, 0x0, 0x100000001, 0x0, 0x74, 0x8001, 0x8, 0x0, 0x3, 0x6, 0x5, 0x81, 0x7, 0xffffffffffff7fff, 0x81, 0x401, 0x2431, 0x9e3, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0x5}, 0x88, 0x0, 0x1, 0x6, 0x0, 0x8, 0x6}, r3, 0x0, 0xffffffffffffff9c, 0x2) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) perf_event_open(0x0, r3, 0xe, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r4, 0x0, 0x0}, 0xa) 08:22:42 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xffffff39) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8910, &(0x7f0000000000)) 08:22:42 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:42 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) write$selinux_create(r2, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) 08:22:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f00000003c0)={&(0x7f0000000640)=""/226, 0xe2}}, 0x10) 08:22:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f00000003c0)={&(0x7f0000000640)=""/226, 0xe2}}, 0x10) 08:22:43 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ppoll(&(0x7f00000003c0)=[{}], 0x1, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xaf2}) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 08:22:43 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:43 executing program 2: r0 = socket$inet(0x2, 0x5000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000500)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0xffffffffffefffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="8bd4c32bdc98f333616db78d47f946397114c62c417689fc3aa6791df16c35cc14a966aa04edac0c66e107ddd0708c0a938ed2c2c76245ca5559325fcab81a2c19c12b857c0bdac24e2d2816d8399926790d707f53f8faad5183ecf73e8536ae8896ace02837a709bf95a221ea18d5a642a4f0d0578b7e42036f10fd3b70c03f76e6", 0x82}], 0x1}, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/63, 0x3f}], 0x1}, 0x0) r1 = gettid() tkill(r1, 0x14) 08:22:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={0x0, r0}, 0x10) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x1d0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = gettid() write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)=r0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x6) r4 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xe5f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xe4, 0x0, 0x0, 0x100000000, 0x0, 0x8, 0x0, 0x7, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1a7}, r3, 0x0, r0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x4040, 0x0) close(r2) perf_event_open(&(0x7f0000000b40)={0x7, 0x70, 0xff, 0x0, 0x10001, 0x3a3c, 0x0, 0x7ff, 0x200, 0x0, 0x0, 0x5, 0xff, 0x3ff, 0x0, 0x0, 0x280, 0x2, 0x0, 0x7, 0x0, 0x100000001, 0x0, 0x74, 0x8001, 0x8, 0x0, 0x3, 0x6, 0x5, 0x81, 0x7, 0xffffffffffff7fff, 0x81, 0x401, 0x2431, 0x9e3, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0x5}, 0x88, 0x0, 0x1, 0x6, 0x0, 0x8, 0x6}, r3, 0x0, 0xffffffffffffff9c, 0x2) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) perf_event_open(0x0, r3, 0xe, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r4, 0x0, 0x0}, 0xa) 08:22:43 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:44 executing program 0: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00'], 0x2) 08:22:44 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:setrans_initrc_exec_t:s0\x00', 0x2b, 0x0) 08:22:44 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') [ 198.019286] audit: type=1400 audit(1560932564.229:67): avc: denied { relabelto } for pid=10330 comm="syz-executor.0" name="UDP-Lite" dev="sockfs" ino=38053 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setrans_initrc_exec_t:s0 tclass=rawip_socket permissive=1 [ 199.410193] IPVS: ftp: loaded support on port[0] = 21 [ 199.739018] chnl_net:caif_netlink_parms(): no params data found [ 199.774129] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.780700] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.787949] device bridge_slave_0 entered promiscuous mode [ 199.794647] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.801150] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.808006] device bridge_slave_1 entered promiscuous mode [ 199.825935] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 199.834797] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 199.852785] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 199.859806] team0: Port device team_slave_0 added [ 199.865466] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 199.872550] team0: Port device team_slave_1 added [ 199.877679] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 199.885032] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 199.954895] device hsr_slave_0 entered promiscuous mode [ 200.020340] device hsr_slave_1 entered promiscuous mode [ 200.061411] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 200.068381] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 200.081038] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.087393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.094054] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.100444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.128527] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 200.135010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.145178] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 200.155243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.162885] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.169456] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.178497] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 200.184640] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.194065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.201777] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.208097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.217070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.225173] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.231575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.251504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.259571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.267268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.274778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.282461] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.291998] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 200.298020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.312383] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 200.322072] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.743799] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 08:22:47 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:47 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000280)=""/149, 0x95) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x0, {0x82, 0x0, 0x7}}, 0x14) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) close(0xffffffffffffffff) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/171, 0xab) 08:22:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @loopback}, 0x0, 0x1}, 0x20) 08:22:47 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:47 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) [ 201.530906] loop1: unable to read partition table [ 201.536011] loop1: partition table beyond EOD, truncated [ 201.541922] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:22:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x3e0000}], 0x0) 08:22:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x20}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8001}) write$cgroup_int(r0, &(0x7f0000000000), 0xff2a) 08:22:47 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:47 executing program 2: mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00007a7000)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000080)='./control\x00') 08:22:47 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfec7be070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) io_setup(0x3, &(0x7f00000001c0)=0x0) io_getevents(r3, 0x0, 0x0, 0x0, 0x0) io_submit(r3, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) 08:22:48 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) 08:22:48 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000280)=""/149, 0x95) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x0, {0x82, 0x0, 0x7}}, 0x14) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) close(0xffffffffffffffff) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/171, 0xab) 08:22:48 executing program 2: syz_emit_ethernet(0x11, &(0x7f0000000800)={@remote, @link_local, [], {@x25}}, 0x0) 08:22:48 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$msdos(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='tracefs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00') 08:22:48 executing program 5: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x5) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x4, 0x0, &(0x7f00000001c0)=[@enter_looper], 0x1, 0x0, &(0x7f0000000200)="86"}) 08:22:48 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010002008d7f00000000000000796dac3cfae00943e42bd2a7d95117b878bdb87b0283b6d5f0ba0f45c1935a"]) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:48 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:48 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000280)=""/149, 0x95) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x0, {0x82, 0x0, 0x7}}, 0x14) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) close(0xffffffffffffffff) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/171, 0xab) 08:22:48 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:48 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 08:22:48 executing program 5: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x5) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x4, 0x0, &(0x7f00000001c0)=[@enter_looper], 0x1, 0x0, &(0x7f0000000200)="86"}) 08:22:48 executing program 4: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x5) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x4, 0x0, &(0x7f00000001c0)=[@enter_looper], 0x1, 0x0, &(0x7f0000000200)="86"}) [ 202.251461] device bridge_slave_1 left promiscuous mode [ 202.268341] bridge0: port 2(bridge_slave_1) entered disabled state 08:22:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) recvfrom$inet(r0, 0x0, 0x518db98b, 0x0, 0x0, 0x800e00801) shmget$private(0x0, 0x4000, 0x80, &(0x7f0000ffc000/0x4000)=nil) openat(r1, &(0x7f0000000000)='./file0\x00', 0x108, 0x8) shutdown(r1, 0x0) 08:22:48 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3, 0x10, r0, 0x0) getsockname$inet(r0, 0x0, &(0x7f00000001c0)=0xffffffffffffffe8) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e00969) 08:22:48 executing program 5: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x5) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x4, 0x0, &(0x7f00000001c0)=[@enter_looper], 0x1, 0x0, &(0x7f0000000200)="86"}) [ 202.371050] device bridge_slave_0 left promiscuous mode [ 202.377911] bridge0: port 1(bridge_slave_0) entered disabled state 08:22:48 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') [ 202.480856] audit: type=1400 audit(1560932568.699:68): avc: denied { map } for pid=10454 comm="syz-executor.2" path="socket:[38927]" dev="sockfs" ino=38927 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=rawip_socket permissive=1 [ 202.652782] device hsr_slave_1 left promiscuous mode [ 202.705131] device hsr_slave_0 left promiscuous mode [ 202.749183] team0 (unregistering): Port device team_slave_1 removed [ 202.767704] team0 (unregistering): Port device team_slave_0 removed [ 202.777402] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 202.823441] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 202.895638] bond0 (unregistering): Released all slaves [ 205.450191] IPVS: ftp: loaded support on port[0] = 21 [ 205.773038] chnl_net:caif_netlink_parms(): no params data found [ 205.806855] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.813446] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.820681] device bridge_slave_0 entered promiscuous mode [ 205.827262] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.833978] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.841234] device bridge_slave_1 entered promiscuous mode [ 205.859020] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.868140] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.885333] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.892614] team0: Port device team_slave_0 added [ 205.897903] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.905128] team0: Port device team_slave_1 added [ 205.910418] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.917610] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 205.993987] device hsr_slave_0 entered promiscuous mode [ 206.030415] device hsr_slave_1 entered promiscuous mode [ 206.100569] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 206.107440] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 206.119710] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.126106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.132757] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.139128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.169924] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 206.176117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.184928] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 206.194725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.201964] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.208551] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.218464] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 206.224639] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.233281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.241227] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.247587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.256999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.264650] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.271030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.286388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.294141] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.308816] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 206.318843] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 206.329351] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 206.336202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.343884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.351687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.359060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.371759] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 206.381188] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.761025] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 08:22:53 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) write$selinux_create(r3, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x5d, &(0x7f0000000040)="0e097e6c", 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e007d6) 08:22:53 executing program 5: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x5) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x4, 0x0, &(0x7f00000001c0)=[@enter_looper], 0x1, 0x0, &(0x7f0000000200)="86"}) 08:22:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000002680)={0x0, 0xff65, &(0x7f0000000140)=[{0x0, 0x1b6}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000040)=""/8, 0xfffffffffffffcec}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0064e) shutdown(r1, 0x0) poll(&(0x7f0000000080)=[{r2, 0x2002}], 0x1, 0x0) shutdown(r2, 0x0) 08:22:53 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f00000000c0)=[{r0, 0x40}], 0x1, 0x200) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) shutdown(r2, 0x0) readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/140, 0x8c}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r3, 0x0) [ 207.410991] loop1: unable to read partition table [ 207.416036] loop1: partition table beyond EOD, truncated [ 207.422007] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:22:53 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000002680)={0x0, 0xff65, &(0x7f0000000140)=[{0x0, 0x1b6}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000040)=""/8, 0xfffffffffffffcec}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0064e) shutdown(r1, 0x0) shutdown(r2, 0x0) 08:22:53 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) write$selinux_create(r3, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:53 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:53 executing program 1: clone(0x1000200, &(0x7f0000000780)="7d0f1b5069a9d041d92bb5b8b725b3a9179435c9f405324ab12bfc9d65006d2f151cc91e3e8c41bffe8d4a7b50de4422a552cba424ce7ebded13db0cd351fa09ff5cff3dfe215f533c00f0192d555e0a528123f84c2186316339efcfb842780427404decd916435d98e2c75c", 0x0, &(0x7f0000000800), &(0x7f0000000240)="64e7853a88128f05ee6cd01d1b3e0433d2d2fe7f40b4695c082543f2cd414fa58132d337ea7a05223ea23c8ec6da9e88cc3882134aa746a3639fce822199757a94022e88f6418f1bd4f4699f7094b0ea4a167bfc5835dd8bd8934b22cfad6d5830001ec127faf15491f9ddd2766132a6acc3726b54") syz_open_dev$sg(&(0x7f0000001d00)='/dev/sg#\x00', 0x3, 0x8600) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="328179e359566c2b6d000d07dd98908404301739dbabcd6ee633707e5d67776db54d18337402d599a1dc2a25a6", 0x2d, 0x155c}]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000680)=0x200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) write$selinux_create(r3, &(0x7f0000000240)=@objname={'system_u:object_r:pam_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x81, 0x20, './file0\x00'}, 0x65) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_value={r1, 0x9}, &(0x7f0000000100)=0x8) 08:22:53 executing program 2: 08:22:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eea, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) lookup_dcookie(0x6, &(0x7f00000000c0)=""/2, 0x2) pread64(r1, &(0x7f0000000240)=""/243, 0xf3, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "54def975ff4743d276185cf633950345"}, 0x11, 0x3) close(r1) [ 207.965274] device bridge_slave_1 left promiscuous mode [ 207.974764] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.990711] vivid-000: kernel_thread() failed [ 208.030985] device bridge_slave_0 left promiscuous mode [ 208.036489] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.153255] device hsr_slave_1 left promiscuous mode [ 208.192835] device hsr_slave_0 left promiscuous mode [ 208.233874] team0 (unregistering): Port device team_slave_1 removed [ 208.245930] team0 (unregistering): Port device team_slave_0 removed [ 208.255440] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 208.323612] bond0 (unregistering): Releasing backup interface bond_slave_0 08:22:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eea, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) lookup_dcookie(0x6, &(0x7f00000000c0)=""/2, 0x2) pread64(r1, &(0x7f0000000240)=""/243, 0xf3, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "54def975ff4743d276185cf633950345"}, 0x11, 0x3) close(r1) 08:22:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) pread64(r0, &(0x7f0000000240)=""/243, 0xf3, 0x0) 08:22:54 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, 0x7f, 0x7f777f5b, 0x7, 0x4, 0x800, 0x5, 0xfffffffffffff476}}) 08:22:54 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eea, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) lookup_dcookie(0x6, &(0x7f00000000c0)=""/2, 0x2) pread64(r1, &(0x7f0000000240)=""/243, 0xf3, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "54def975ff4743d276185cf633950345"}, 0x11, 0x3) close(r1) [ 208.395967] bond0 (unregistering): Released all slaves 08:22:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eea, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) lookup_dcookie(0x6, &(0x7f00000000c0)=""/2, 0x2) pread64(r1, &(0x7f0000000240)=""/243, 0xf3, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "54def975ff4743d276185cf633950345"}, 0x11, 0x3) close(r1) 08:22:54 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = dup2(r0, r0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, 0x0, &(0x7f0000000200)) 08:22:54 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00') 08:22:54 executing program 0: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@cruft='cruft'}, {@sbsector={'sbsector'}}, {@utf8='utf8'}]}) [ 208.527129] BUG: unable to handle kernel NULL pointer dereference at 0000000000000020 [ 208.535163] IP: kthread_stop+0x4c/0x650 [ 208.539142] PGD 92ee3067 P4D 92ee3067 PUD 93c83067 PMD 0 [ 208.544701] Oops: 0002 [#1] PREEMPT SMP KASAN [ 208.549197] Modules linked in: [ 208.552397] CPU: 0 PID: 10543 Comm: syz-executor.5 Not tainted 4.14.128 #22 [ 208.559494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.568848] task: ffff888061e5a540 task.stack: ffff88805f320000 [ 208.574909] RIP: 0010:kthread_stop+0x4c/0x650 [ 208.576699] kobject: 'loop4' (ffff8880a4a94a20): kobject_uevent_env [ 208.579399] RSP: 0018:ffff88805f327b50 EFLAGS: 00010212 [ 208.579409] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc9000824f000 [ 208.579418] RDX: 0000000000000968 RSI: ffffffff813e150c RDI: 0000000000000286 [ 208.588702] kobject: 'loop4' (ffff8880a4a94a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 208.591165] RBP: ffff88805f327b70 R08: ffff888061e5a540 R09: 0000000000000000 [ 208.591171] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 208.591176] R13: ffff888082ec7a30 R14: ffff888082ec7a28 R15: ffffffff89bb8be0 [ 208.591184] FS: 00007f7c6395f700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 208.591189] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 208.591196] CR2: 0000000000000020 CR3: 0000000092e74000 CR4: 00000000001406f0 [ 208.591204] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 208.603403] kobject: 'loop2' (ffff8880a4a2b1e0): kobject_uevent_env [ 208.605729] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 208.605732] Call Trace: [ 208.605752] vivid_stop_generating_vid_cap+0x1b9/0x664 [ 208.605766] vid_cap_stop_streaming+0x7c/0xd0 [ 208.622708] kobject: 'loop2' (ffff8880a4a2b1e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 208.629727] ? vid_cap_buf_queue+0x230/0x230 [ 208.629743] __vb2_queue_cancel+0xa3/0x890 [ 208.709665] ? lock_downgrade+0x6e0/0x6e0 [ 208.713800] vb2_core_streamoff+0x52/0x110 [ 208.718019] __vb2_cleanup_fileio+0x78/0x150 [ 208.722407] vb2_core_queue_release+0x1d/0x80 [ 208.726887] _vb2_fop_release+0x1cf/0x2a0 [ 208.731212] vb2_fop_release+0x75/0xc0 [ 208.735120] vivid_fop_release+0x180/0x3f0 [ 208.739337] ? vivid_remove+0x3d0/0x3d0 [ 208.743302] ? dev_debug_store+0xe0/0xe0 [ 208.747352] v4l2_release+0xf9/0x190 [ 208.751069] __fput+0x275/0x7a0 [ 208.754374] ____fput+0x16/0x20 [ 208.757638] task_work_run+0x114/0x190 [ 208.761508] exit_to_usermode_loop+0x1da/0x220 [ 208.766070] do_syscall_64+0x4bc/0x640 [ 208.769937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.774769] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.779936] RIP: 0033:0x4592c9 [ 208.783101] RSP: 002b:00007f7c6395ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 208.790788] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 00000000004592c9 [ 208.798035] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 208.805284] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 208.812554] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c6395f6d4 [ 208.819804] R13: 00000000004f8052 R14: 00000000004d0e30 R15: 00000000ffffffff [ 208.827069] Code: 00 65 8b 1d 47 6c c3 7e 83 fb 3f 0f 87 5e 04 00 00 e8 89 92 1e 00 89 db 48 0f a3 1d df f7 e6 06 0f 82 47 03 00 00 e8 74 92 1e 00 41 ff 44 24 20 49 8d 7c 24 24 48 b8 00 00 00 00 00 fc ff df [ 208.846249] RIP: kthread_stop+0x4c/0x650 RSP: ffff88805f327b50 [ 208.852193] CR2: 0000000000000020 [ 208.859297] ---[ end trace d14bb34b20123d70 ]--- [ 208.860978] kobject: 'loop3' (ffff8880a4a02120): kobject_uevent_env [ 208.865853] Kernel panic - not syncing: Fatal exception [ 208.876871] Kernel Offset: disabled [ 208.880488] Rebooting in 86400 seconds..