Warning: Permanently added '10.128.10.17' (ECDSA) to the list of known hosts. 2019/12/18 18:19:12 fuzzer started 2019/12/18 18:19:14 dialing manager at 10.128.0.26:41003 2019/12/18 18:19:14 syscalls: 2701 2019/12/18 18:19:14 code coverage: enabled 2019/12/18 18:19:14 comparison tracing: enabled 2019/12/18 18:19:14 extra coverage: enabled 2019/12/18 18:19:14 setuid sandbox: enabled 2019/12/18 18:19:14 namespace sandbox: enabled 2019/12/18 18:19:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/18 18:19:14 fault injection: enabled 2019/12/18 18:19:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/18 18:19:14 net packet injection: enabled 2019/12/18 18:19:14 net device setup: enabled 2019/12/18 18:19:14 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/18 18:19:14 devlink PCI setup: PCI device 0000:00:10.0 is not available 18:21:54 executing program 0: 18:21:54 executing program 1: syzkaller login: [ 241.039493][ T9497] IPVS: ftp: loaded support on port[0] = 21 [ 241.172769][ T9499] IPVS: ftp: loaded support on port[0] = 21 18:21:54 executing program 2: [ 241.261728][ T9497] chnl_net:caif_netlink_parms(): no params data found [ 241.389904][ T9497] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.406188][ T9497] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.413958][ T9497] device bridge_slave_0 entered promiscuous mode [ 241.430371][ T9497] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.439148][ T9497] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.447352][ T9497] device bridge_slave_1 entered promiscuous mode [ 241.465099][ T9502] IPVS: ftp: loaded support on port[0] = 21 [ 241.539152][ T9497] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 241.558574][ T9499] chnl_net:caif_netlink_parms(): no params data found 18:21:54 executing program 3: [ 241.580712][ T9497] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 241.664883][ T9497] team0: Port device team_slave_0 added [ 241.693471][ T9497] team0: Port device team_slave_1 added [ 241.748384][ T9499] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.755468][ T9499] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.777346][ T9499] device bridge_slave_0 entered promiscuous mode [ 241.809415][ T9499] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.820878][ T9499] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.829573][ T9499] device bridge_slave_1 entered promiscuous mode 18:21:55 executing program 4: [ 241.899576][ T9497] device hsr_slave_0 entered promiscuous mode [ 241.946411][ T9497] device hsr_slave_1 entered promiscuous mode [ 242.004811][ T9505] IPVS: ftp: loaded support on port[0] = 21 [ 242.075868][ T9499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 242.095209][ T9499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 242.167224][ T9499] team0: Port device team_slave_0 added [ 242.208782][ T9508] IPVS: ftp: loaded support on port[0] = 21 [ 242.218253][ T9499] team0: Port device team_slave_1 added [ 242.237070][ T9502] chnl_net:caif_netlink_parms(): no params data found 18:21:55 executing program 5: [ 242.349899][ T9497] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 242.415867][ T9497] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 242.508348][ T9499] device hsr_slave_0 entered promiscuous mode [ 242.546481][ T9499] device hsr_slave_1 entered promiscuous mode [ 242.606119][ T9499] debugfs: Directory 'hsr0' with parent '/' already present! [ 242.633246][ T9497] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 242.690101][ T9497] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 242.793653][ T9510] IPVS: ftp: loaded support on port[0] = 21 [ 242.849370][ T9502] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.857224][ T9502] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.864890][ T9502] device bridge_slave_0 entered promiscuous mode [ 242.881503][ T9499] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 242.930811][ T9499] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 242.977741][ T9502] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.984840][ T9502] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.993376][ T9502] device bridge_slave_1 entered promiscuous mode [ 243.018868][ T9502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.036500][ T9505] chnl_net:caif_netlink_parms(): no params data found [ 243.046981][ T9499] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 243.082689][ T9499] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 243.139694][ T9502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.270926][ T9502] team0: Port device team_slave_0 added [ 243.281918][ T9502] team0: Port device team_slave_1 added [ 243.288564][ T9505] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.295641][ T9505] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.305363][ T9505] device bridge_slave_0 entered promiscuous mode [ 243.343574][ T9508] chnl_net:caif_netlink_parms(): no params data found [ 243.388215][ T9502] device hsr_slave_0 entered promiscuous mode [ 243.436797][ T9502] device hsr_slave_1 entered promiscuous mode [ 243.506045][ T9502] debugfs: Directory 'hsr0' with parent '/' already present! [ 243.513738][ T9505] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.520941][ T9505] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.528789][ T9505] device bridge_slave_1 entered promiscuous mode [ 243.570628][ T9505] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.600102][ T9505] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.641661][ T9508] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.654648][ T9508] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.662756][ T9508] device bridge_slave_0 entered promiscuous mode [ 243.690108][ T9505] team0: Port device team_slave_0 added [ 243.696379][ T9508] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.703498][ T9508] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.715757][ T9508] device bridge_slave_1 entered promiscuous mode [ 243.783850][ T9505] team0: Port device team_slave_1 added [ 243.799366][ T9508] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.815774][ T9510] chnl_net:caif_netlink_parms(): no params data found [ 243.843930][ T9508] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.872421][ T9497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.919669][ T9505] device hsr_slave_0 entered promiscuous mode [ 243.956581][ T9505] device hsr_slave_1 entered promiscuous mode [ 244.006173][ T9505] debugfs: Directory 'hsr0' with parent '/' already present! [ 244.020799][ T9502] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 244.094086][ T9502] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 244.160715][ T9502] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 244.228873][ T9502] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 244.303532][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.311737][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.340984][ T9508] team0: Port device team_slave_0 added [ 244.357044][ T9508] team0: Port device team_slave_1 added [ 244.365727][ T9497] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.413764][ T9510] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.422344][ T9510] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.430569][ T9510] device bridge_slave_0 entered promiscuous mode [ 244.450340][ T9505] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 244.513384][ T9505] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 244.581921][ T9505] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 244.639574][ T9510] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.647061][ T9510] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.654845][ T9510] device bridge_slave_1 entered promiscuous mode [ 244.664211][ T9499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.739414][ T9508] device hsr_slave_0 entered promiscuous mode [ 244.799655][ T9508] device hsr_slave_1 entered promiscuous mode [ 244.836222][ T9508] debugfs: Directory 'hsr0' with parent '/' already present! [ 244.843876][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.853720][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.862265][ T3008] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.869555][ T3008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.878497][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.892150][ T9505] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 244.966638][ T9499] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.973864][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.982359][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.990341][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 244.999253][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.007717][ T3414] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.014774][ T3414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.042315][ T9510] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.072236][ T9510] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 245.092662][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.101263][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.111640][ T9513] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.118772][ T9513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.165230][ T9510] team0: Port device team_slave_0 added [ 245.177620][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.186369][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.194873][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.203932][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.213950][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.221070][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.228995][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.242710][ T9510] team0: Port device team_slave_1 added [ 245.261076][ T9508] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 245.320980][ T9508] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 245.379610][ T9508] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 245.440523][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.450468][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.459218][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.468711][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.528319][ T9510] device hsr_slave_0 entered promiscuous mode [ 245.566744][ T9510] device hsr_slave_1 entered promiscuous mode [ 245.616150][ T9510] debugfs: Directory 'hsr0' with parent '/' already present! [ 245.626911][ T9508] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 245.681988][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.694705][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.703290][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.758654][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.767703][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.776892][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.785763][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.794972][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.803832][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.812648][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.821099][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.835406][ T9497] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 245.849341][ T9497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.871653][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.880821][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.890849][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.899387][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.908728][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.939229][ T9499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.985922][ T9510] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 246.020104][ T9510] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 246.080143][ T9510] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 246.150835][ T9502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.171648][ T9505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.185714][ T9510] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 246.229427][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.238994][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.247365][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.254762][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.269728][ T9502] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.309897][ T9497] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.331029][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.339183][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.347245][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.358081][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.366788][ T3008] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.373824][ T3008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.381823][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.389777][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.411742][ T9505] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.427447][ T9499] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.455703][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.469776][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.488390][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.497963][ T3008] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.505035][ T3008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.522143][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.536973][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.545272][ T3008] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.552360][ T3008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.562539][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.571726][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.601232][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.614205][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.632629][ T3414] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.639771][ T3414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.658973][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.711717][ T9508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.730244][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.745454][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 18:22:00 executing program 0: 18:22:00 executing program 1: [ 246.755025][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.772037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.784461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.822273][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:22:00 executing program 0: [ 246.887404][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 246.895248][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 246.911405][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.931597][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 18:22:00 executing program 1: 18:22:00 executing program 0: [ 246.961667][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.980465][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.991511][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.004943][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.015815][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.030687][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.041669][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.055431][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.070524][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.081698][ T3414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.098565][ T9508] 8021q: adding VLAN 0 to HW filter on device team0 18:22:00 executing program 1: [ 247.107080][ T9502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 247.118540][ T9510] 8021q: adding VLAN 0 to HW filter on device bond0 18:22:00 executing program 0: [ 247.174262][ T9505] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 18:22:00 executing program 0: [ 247.238836][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 247.264447][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.275433][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.324700][ T9510] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.404865][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.429353][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.444110][ T9513] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.451288][ T9513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.469141][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.478207][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.486670][ T9513] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.493714][ T9513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.501501][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.509673][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.517587][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 247.524981][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.555228][ T9502] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 247.566422][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.574362][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.583262][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.593761][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.602564][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.609651][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.618507][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.627375][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 247.635825][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.644270][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.652774][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.661643][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.668753][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.676550][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 247.683989][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.713326][ T9505] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 247.727069][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.734998][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 247.743241][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.753713][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.763665][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 247.772471][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.805083][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 247.815892][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.825116][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.833731][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.842888][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.851663][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.860869][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 247.869599][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.880174][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 247.890596][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.899130][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.912814][ T9508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 247.941512][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.956960][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 18:22:01 executing program 2: 18:22:01 executing program 3: [ 248.057055][ T9508] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 248.068866][ T9510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 248.126192][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 248.133747][ T9513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 248.196410][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 248.203952][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 248.281740][ T9510] 8021q: adding VLAN 0 to HW filter on device batadv0 18:22:01 executing program 4: 18:22:01 executing program 5: 18:22:01 executing program 1: 18:22:01 executing program 0: 18:22:01 executing program 2: 18:22:01 executing program 3: 18:22:01 executing program 4: 18:22:01 executing program 3: 18:22:02 executing program 4: 18:22:02 executing program 2: 18:22:02 executing program 1: 18:22:02 executing program 0: 18:22:02 executing program 3: 18:22:02 executing program 5: 18:22:02 executing program 4: 18:22:02 executing program 2: 18:22:02 executing program 1: 18:22:02 executing program 0: 18:22:02 executing program 4: 18:22:02 executing program 3: 18:22:02 executing program 5: 18:22:02 executing program 1: 18:22:02 executing program 2: 18:22:02 executing program 4: 18:22:02 executing program 0: 18:22:02 executing program 5: 18:22:02 executing program 1: 18:22:02 executing program 3: 18:22:02 executing program 2: 18:22:02 executing program 0: 18:22:02 executing program 4: 18:22:02 executing program 2: 18:22:03 executing program 3: 18:22:03 executing program 5: 18:22:03 executing program 1: 18:22:03 executing program 0: 18:22:03 executing program 2: 18:22:03 executing program 4: 18:22:03 executing program 5: 18:22:03 executing program 3: 18:22:03 executing program 4: 18:22:03 executing program 1: 18:22:03 executing program 2: 18:22:03 executing program 0: 18:22:03 executing program 5: 18:22:03 executing program 3: 18:22:03 executing program 1: 18:22:03 executing program 5: 18:22:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$inet6(r0, &(0x7f0000000ec0)=[{{&(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) 18:22:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 18:22:03 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000008980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008800)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @dev}}}], 0x20}, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) bind(0xffffffffffffffff, &(0x7f0000670000)=@generic={0x0, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 18:22:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000140)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e20, 0x5, @empty, 0x10000}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={r4, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={r5, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x4, 0x3, 0xffff, 0x2, 0x22, 0x2, 0x7}, &(0x7f0000000100)=0x9c) syz_genetlink_get_family_id$tipc(0x0) r6 = dup2(r0, r1) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 18:22:04 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3000000, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800004000"}}) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000580)={0xfff, 0x7f, 0xfffffe01, 0x7b, &(0x7f00000001c0)=""/123, 0xb0, &(0x7f0000000440)=""/176, 0x63, &(0x7f0000000500)=""/99}) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401000000c0073510fbff0000b408000000fab771172119000020002000004e5e0000388022"], 0x38}, 0x8000) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x8) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r2, 0xc1004111, &(0x7f00000002c0)={0x0, [[0x0, 0x291, 0x5, 0x4, 0x3f, 0x10001, 0x3, 0x11], [0x100, 0x4, 0x9, 0x1, 0x3, 0x6, 0x81, 0x6], [0x8e, 0x3ff, 0x1, 0x28, 0x80000000, 0x2, 0x3ff, 0x4]], [{0xe9, 0x80000000, 0x40}, {0x59, 0x94b, 0x1ff}, {0x9, 0x5c, 0x1}, {0x2, 0x8, 0x7f}, {0x4, 0x1ff, 0x6}, {0x1, 0x9, 0x800}, {0xbe7c, 0x4, 0x6}, {0x1f, 0xf13, 0x9}, {0x7, 0x7, 0x4}, {0x2, 0x1, 0x40}, {0x5, 0x1ff, 0x4}, {0x401, 0x1000, 0x400}], 0x4}) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) [ 250.637722][ T9663] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:22:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='ecryptfs\x00', 0x0, &(0x7f0000000440)='posix_acl_access(*@em1selfI\x00') open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0xd, 0x5, 0x58, "ed17748cb9b4b183293bc4eecf7f53c1aa85fee60ac13d5d254911be7738eba813bc9f4ce348be236c4541baf91c74869ef4ecc49854c91a4e4dcc41cdd4ef7b25f6e892a1cb775ae31cf9add2bfd63e3c96f22ab1c4a00a"}, 0x62, 0xadb127da40ec6c7c) write$P9_RREADLINK(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="a7724bdef6434600002b35ab9f1b2f92ffd1a51c4bfce1e70251a8bd678625f508300200000042847bc2fdffe8cd918b035041291559f3ee3a46069062af9680d512f4d8a5c51817c3ff01a1eb2ac71e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f1d7106f5776f8811e658a49a000000000000bf67a33b39256dc9d93b5e79e3b0ff07b4f7e6de42a1f31bdef22c843041f583c23df73b4c5cba2730b820f8ba5a4f385e868f293020eae3"], 0xb5) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) 18:22:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x2e) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='status\x00') preadv(r1, &(0x7f0000000640)=[{&(0x7f0000000280)=""/161, 0xa1}], 0x1, 0x0) [ 250.805535][ C0] hrtimer: interrupt took 55905 ns 18:22:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:04 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000002dc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x11b000, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/424]}, 0x220) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) r5 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r5, 0x0, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x4e21, @local}, 0x10) listen(r4, 0x5eb857) accept4(r4, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_SIGNAL_MSI(r7, 0x4020aea5, &(0x7f00000000c0)={0xf000, 0x10000, 0xc9fd, 0x401, 0x5}) write$selinux_attr(r2, &(0x7f0000000140)='system_u:object_r:smartcard_device_t:s0\x00', 0x28) 18:22:04 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_user='access=user'}]}}) [ 251.026110][ T9692] ecryptfs_parse_options: eCryptfs: unrecognized option [posix_acl_access(*@em1selfI] [ 251.035777][ T9692] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 251.049620][ T9692] Error parsing options; rc = [-22] [ 251.237282][ T9692] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 19) [ 251.246854][ T9692] FAT-fs (loop0): Filesystem has been set read-only [ 251.254617][ T9692] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 19) 18:22:04 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x0, &(0x7f00000003c0)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x4, 0x1, 0x0, r1, &(0x7f0000000000), 0x20000}]) r3 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000140)=0x8) io_submit(0x0, 0x20000000000000dd, &(0x7f00000006c0)) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x460b, r0, &(0x7f0000000580)="a293589e755b078f9c803f99419b0e08d84a2d1b25e9f3e8cf64336376b545acd81dd48f8f860f026a0bb91863abecc073a0784d4c6f4d2cddf19bf3d5a3c056f48066dcf48c6a9d", 0x48, 0x10000}]) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b28, &(0x7f0000000000)='wlan0\x00') close(0xffffffffffffffff) [ 251.306688][ T9701] ecryptfs_parse_options: eCryptfs: unrecognized option [posix_acl_access(*@em1selfI] [ 251.409641][ T9710] fuse: Bad value for 'group_id' 18:22:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) [ 251.431088][ T9701] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 251.461673][ T9713] fuse: Bad value for 'group_id' [ 251.483650][ T9701] Error parsing options; rc = [-22] 18:22:04 executing program 1: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30001}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x8, 0x3f, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x8000018, 0x946, @l2={'ib', 0x3a, 'bridge0\x00'}}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x1) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) close(0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x7, 0x4) openat$dir(0xffffffffffffff9c, 0x0, 0x408001, 0x0) write$apparmor_exec(r2, &(0x7f0000000080)={'stack ', '=\x02'}, 0x7) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000980)='/dev/sequencer\x00', 0x803, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) r4 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r4, 0x40405514, &(0x7f0000000200)={0x6, 0x5, 0xe7, 0x0, 'syz0\x00', 0xffffffff}) 18:22:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='ecryptfs\x00', 0x0, &(0x7f0000000440)='posix_acl_access(*@em1selfI\x00') open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0xd, 0x5, 0x58, "ed17748cb9b4b183293bc4eecf7f53c1aa85fee60ac13d5d254911be7738eba813bc9f4ce348be236c4541baf91c74869ef4ecc49854c91a4e4dcc41cdd4ef7b25f6e892a1cb775ae31cf9add2bfd63e3c96f22ab1c4a00a"}, 0x62, 0xadb127da40ec6c7c) write$P9_RREADLINK(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="a7724bdef6434600002b35ab9f1b2f92ffd1a51c4bfce1e70251a8bd678625f508300200000042847bc2fdffe8cd918b035041291559f3ee3a46069062af9680d512f4d8a5c51817c3ff01a1eb2ac71e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f1d7106f5776f8811e658a49a000000000000bf67a33b39256dc9d93b5e79e3b0ff07b4f7e6de42a1f31bdef22c843041f583c23df73b4c5cba2730b820f8ba5a4f385e868f293020eae3"], 0xb5) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) 18:22:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35b08ff338832ca84b13a719c053724c5666747ea7723ef96ff4508ed4fcff49b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) r4 = openat$watch_queue(0xffffffffffffff9c, &(0x7f0000000000)='/dev/watch_queue\x00', 0x0, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r4, 0x5761, &(0x7f00000001c0)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYRESHEX=r4], 0x3}}, 0x0) 18:22:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @remote}, 0x10) lseek(r1, 0x2, 0x1) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0xffffffffffffffdd, @local}, 0x10) [ 251.781036][ T9731] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 251.817833][ T9731] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 18:22:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35b08ff338832ca84b13a719c053724c5666747ea7723ef96ff4508ed4fcff49b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) r4 = openat$watch_queue(0xffffffffffffff9c, &(0x7f0000000000)='/dev/watch_queue\x00', 0x0, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r4, 0x5761, &(0x7f00000001c0)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYRESHEX=r4], 0x3}}, 0x0) 18:22:05 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x800, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1fffffa, 0x4000010, r0, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r4, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924b68, 0x0) [ 251.929524][ T9736] ecryptfs_parse_options: eCryptfs: unrecognized option [posix_acl_access(*@em1selfI] [ 251.940875][ T9736] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 251.954280][ T9736] Error parsing options; rc = [-22] [ 252.019940][ T9744] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 18:22:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) dup(r2) sendfile(r1, r0, 0x0, 0x209) [ 252.209367][ T9736] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 19) [ 252.218401][ T9736] FAT-fs (loop0): Filesystem has been set read-only [ 252.225492][ T9736] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 19) 18:22:05 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x2aa, 0x200) r1 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000008700)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)={0xa, 0x0, 0x0, @rand_addr="3ec54b3f9edde21a935313175eef5e9e"}, 0x1c, 0x0, 0x0, &(0x7f0000000280)}}], 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x3c1840) sendmsg$can_raw(r2, &(0x7f0000000240)={&(0x7f0000000180), 0x10, &(0x7f0000000200)={&(0x7f00000001c0)=@can={{0x0, 0x0, 0x1}, 0x7, 0x3, 0x0, 0x0, "abec65b40002b78d"}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x800) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000100)=0x40000000) 18:22:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000000c0)) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) getdents(r2, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) rename(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$getsig(0x4202, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:22:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$kcm(0x11, 0x100000000003, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000180)=0x4) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000111fe4ac14140ceb", 0x18}], 0x1}, 0x0) 18:22:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) dup(r2) sendfile(r1, r0, 0x0, 0x209) 18:22:05 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x70) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x8, 0xb, &(0x7f0000000080)=@raw=[@map={0x18, 0x4, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @jmp={0x5, 0x1, 0x2, 0x2, 0x5, 0x4, 0x4}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x70}, @map_val={0x18, 0xa, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1f}, @map_val={0x18, 0x4, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000040)='GPL\x01', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 18:22:05 executing program 2: r0 = socket(0x10, 0x802, 0x0) r1 = epoll_create1(0x0) rt_sigreturn() epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x70000011}) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) r3 = io_uring_setup(0x90b, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x2, 0x288}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000080)={0x1005}) 18:22:05 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) sched_setattr(r0, &(0x7f0000000340)={0x30, 0x2, 0x0, 0x800, 0x1, 0x2, 0x7ff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="50000000280021f72c53ca770400000000000000", @ANYRES32=r5, @ANYBLOB="ac06000000000000000000000c0080eb8600007293700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f6f1d464c214769c41a5ddc42358257172f7356208a1e3de17e24bac87fabd303c2e5eba5708f93eca1ccbed704"], 0x50}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 18:22:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) dup(r2) sendfile(r1, r0, 0x0, 0x209) 18:22:06 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x10000, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0x3, 0x8}) 18:22:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x9, 0x4, 0x2, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r2 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 18:22:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) pipe(&(0x7f0000000080)) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 18:22:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000480)={0x0, 0x0, {0x5, 0x400, 0x3006, 0x8, 0xb, 0x8, 0x0, 0x5}}) r2 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f000024c000/0x1000)=nil, 0x1000}, 0x1}) userfaultfd(0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000180)='./bus\x00', 0x6, 0x1) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) syz_genetlink_get_family_id$net_dm(&(0x7f0000000680)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x0, 0x890}, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000200)=0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000480)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYRES32, @ANYBLOB, @ANYRES32=r5, @ANYRESOCT=0x0, @ANYRES32=r0, @ANYRES32, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB], @ANYBLOB="0400ff000000", @ANYRES32, @ANYBLOB="6f549c2d8dca900fa52dba5840a1756063d2d36bc77eacd6f57b63c580a145783df8fc87165fe42d341b9bfc730fcc0a77e034a0bf973d7902b23c62091dd340d1243adbc15e997e3f416a943e47a73defa38f5955b25ea8f3afee368d0d381c58c48d044f950658c986949cebbed682b396b5f159b9068c8969e9a7dfdf0000000000d4a8e530400742872c27587801a37519a9674d9c959d629ca58e298f65f28990368379", @ANYBLOB="205051ae5bb269c6c5247d1215a08700a2f16ef12935f0fc7f6ff96b0babb07e275960f3f6aecf0ee28fdffbddd4850a3e16eaf8af8a868a5b550fd9640be9c94a84334dbf71922cbf30ea3acab01e691890a004fde4689044d9d6ac0e77be587c177b92b780354ecc5d93001ad371a53bd27d3a3a74bb676adf37c61a15dd39cc03ef915ea4849fd8d7013caca6f0646976", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYBLOB="30599e3101d12b043241da2e6dc224f3acddd91ffa32068683d3dd7162f0d561947a71fe9fd9a3d12eded02102785343847c1a03a242a113be3b1448badf47f51ec55dbcd53a399d468f5bd8a0ce8db97ee5103f4876ec51c131c99141b94579f8b871a4baa941dd32ff091be6677625ccd6518024bdd13271132516623113f4aedbdc3770d7db3d1f8bfecb92a4536ace289420c3ab1f02447b632281cfefb2cc3a152035952d9791e6c1feaa456e2f6ffb89633c31663f6bbe66842e53ed1db297744b968a279aa93286ebfac6b96c7c71875bd290635bbc9c3419ca420797dec3010dab"], 0x12, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@remote, @in=@multicast2, 0x0, 0x8000, 0x4e20, 0x0, 0x2, 0x1a0, 0x0, 0x89, 0x0, r5}, {0x9, 0x7, 0x0, 0x7, 0x0, 0x34, 0xfffffffffffff259}, {0x9, 0xfffffffffffffffe, 0x0, 0x2}, 0x2, 0x0, 0x6ea699c4f385c0d9, 0x1, 0x0, 0x1}, {{@in=@rand_addr=0x3, 0x4d4, 0x3c}, 0xa, @in6=@rand_addr="77525e76ba852110ff37599a5b3c9dda", 0x34ff, 0x4, 0x0, 0x7b, 0x0, 0x2, 0xf9a2}}, 0xe8) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r8 = openat$cgroup_int(r7, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x7fffffff) r9 = epoll_create1(0x0) r10 = getpid() r11 = gettid() kcmp$KCMP_EPOLL_TFD(r10, r11, 0x7, r9, &(0x7f0000000000)) rt_tgsigqueueinfo(r10, 0x0, 0x4, &(0x7f0000000240)={0x25, 0x596, 0x4}) r12 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r12, 0x200004) sendfile(r3, r12, 0x0, 0x80001d00c0d0) [ 253.716058][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 253.716074][ T27] audit: type=1800 audit(1576693327.002:31): pid=9813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16552 res=0 18:22:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000000c0)) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) getdents(r2, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) rename(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$getsig(0x4202, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:22:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x210000, 0x0) getsockopt$inet6_dccp_buf(r2, 0x21, 0x1e, &(0x7f0000000300)=""/197, &(0x7f0000000080)=0xc5) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x82, 0x0) ioctl$UI_GET_VERSION(r3, 0x8004552d, 0xfffffffffffffffe) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any='access=any'}, {@msize={'msize', 0x3d, 0x8001000}}]}}) 18:22:07 executing program 1: r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="ab5da6ca0000000008009dc65a612df9749463490f54ed631b0000000000"], 0x28}}, 0x0) recvfrom$llc(r0, &(0x7f0000000000)=""/62, 0x3e, 0x1082, &(0x7f0000000080)={0x1a, 0x20, 0x40, 0x1f, 0x8e, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) 18:22:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000480)={0x0, 0x0, {0x5, 0x400, 0x3006, 0x8, 0xb, 0x8, 0x0, 0x5}}) r2 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f000024c000/0x1000)=nil, 0x1000}, 0x1}) userfaultfd(0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000180)='./bus\x00', 0x6, 0x1) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) syz_genetlink_get_family_id$net_dm(&(0x7f0000000680)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x0, 0x890}, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000200)=0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000480)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYRES32, @ANYBLOB, @ANYRES32=r5, @ANYRESOCT=0x0, @ANYRES32=r0, @ANYRES32, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB], @ANYBLOB="0400ff000000", @ANYRES32, @ANYBLOB="6f549c2d8dca900fa52dba5840a1756063d2d36bc77eacd6f57b63c580a145783df8fc87165fe42d341b9bfc730fcc0a77e034a0bf973d7902b23c62091dd340d1243adbc15e997e3f416a943e47a73defa38f5955b25ea8f3afee368d0d381c58c48d044f950658c986949cebbed682b396b5f159b9068c8969e9a7dfdf0000000000d4a8e530400742872c27587801a37519a9674d9c959d629ca58e298f65f28990368379", @ANYBLOB="205051ae5bb269c6c5247d1215a08700a2f16ef12935f0fc7f6ff96b0babb07e275960f3f6aecf0ee28fdffbddd4850a3e16eaf8af8a868a5b550fd9640be9c94a84334dbf71922cbf30ea3acab01e691890a004fde4689044d9d6ac0e77be587c177b92b780354ecc5d93001ad371a53bd27d3a3a74bb676adf37c61a15dd39cc03ef915ea4849fd8d7013caca6f0646976", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYBLOB="30599e3101d12b043241da2e6dc224f3acddd91ffa32068683d3dd7162f0d561947a71fe9fd9a3d12eded02102785343847c1a03a242a113be3b1448badf47f51ec55dbcd53a399d468f5bd8a0ce8db97ee5103f4876ec51c131c99141b94579f8b871a4baa941dd32ff091be6677625ccd6518024bdd13271132516623113f4aedbdc3770d7db3d1f8bfecb92a4536ace289420c3ab1f02447b632281cfefb2cc3a152035952d9791e6c1feaa456e2f6ffb89633c31663f6bbe66842e53ed1db297744b968a279aa93286ebfac6b96c7c71875bd290635bbc9c3419ca420797dec3010dab"], 0x12, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@remote, @in=@multicast2, 0x0, 0x8000, 0x4e20, 0x0, 0x2, 0x1a0, 0x0, 0x89, 0x0, r5}, {0x9, 0x7, 0x0, 0x7, 0x0, 0x34, 0xfffffffffffff259}, {0x9, 0xfffffffffffffffe, 0x0, 0x2}, 0x2, 0x0, 0x6ea699c4f385c0d9, 0x1, 0x0, 0x1}, {{@in=@rand_addr=0x3, 0x4d4, 0x3c}, 0xa, @in6=@rand_addr="77525e76ba852110ff37599a5b3c9dda", 0x34ff, 0x4, 0x0, 0x7b, 0x0, 0x2, 0xf9a2}}, 0xe8) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r8 = openat$cgroup_int(r7, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x7fffffff) r9 = epoll_create1(0x0) r10 = getpid() r11 = gettid() kcmp$KCMP_EPOLL_TFD(r10, r11, 0x7, r9, &(0x7f0000000000)) rt_tgsigqueueinfo(r10, 0x0, 0x4, &(0x7f0000000240)={0x25, 0x596, 0x4}) r12 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r12, 0x200004) sendfile(r3, r12, 0x0, 0x80001d00c0d0) 18:22:08 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) sched_setattr(r0, &(0x7f0000000340)={0x30, 0x2, 0x0, 0x800, 0x1, 0x2, 0x7ff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="50000000280021f72c53ca770400000000000000", @ANYRES32=r5, @ANYBLOB="ac06000000000000000000000c0080eb8600007293700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f6f1d464c214769c41a5ddc42358257172f7356208a1e3de17e24bac87fabd303c2e5eba5708f93eca1ccbed704"], 0x50}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 18:22:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:08 executing program 2: r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r0, 0x1000000) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2, 0x0) 18:22:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000000c0)) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) getdents(r2, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) rename(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$getsig(0x4202, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 18:22:08 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000380)='/dev/snd/timer\x00', 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000003c0)={{0x0, 0x0, 0x7fffffff, 0x1}, 0x7, 0xcd}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700000000000000000000e1c0", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000600)='/dev/video37\x00', 0x2, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a4740004000000000000000000001a0000d24000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000800010073667100480002000000000000000000000000000000000000000000000000000000000000471a00000000000000000000000000000000000000000000f3aff151ed1e4a08454f9c9ed6974ba345296ca6ffafecb3ab42207c5c129cdf6500"/126], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r4, @ANYBLOB="00000002000000000300c4c1080001006270660050000600080006000000000004000500400002003c00010000000000eeff0020000000000b75da891600000011000000000000000010000000000000000000000000000000000000000000ddffffff00"/116], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) r6 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) umount2(&(0x7f00000005c0)='./file1\x00', 0x0) write$FUSE_NOTIFY_STORE(r6, &(0x7f0000000440)={0x2d, 0x4, 0x0, {0x0, 0xa0, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) 18:22:08 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000000)={0x40, 0x401, 0x401}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) vmsplice(r0, &(0x7f0000000480)=[{&(0x7f0000000100)="58469f304dbe4299585b52acc59968ac33df4f8c64565e6edf52e4496162d77ed5b3", 0x22}, {&(0x7f0000000300)="3b3e267a633d1db9058d147f52c555ee08ff30ef841854748448120e3f2a33f167f76fa269d549496d95450c09f873f84cb81a7cf082b7d8791c9d501bb5f06f6936cb4797598821c58c5efc7f066fc1afb395b22aa3436b2c4087dc682de30eec36080e3062d96b63", 0x69}, {&(0x7f0000000380)="347dad64b850a60a9de229fc890334ebbff645c3bb24b07160847e779988cf17c2b83b5d4118c59b0658171a3f3cf9747e98e6402e9e7cca6948a02e87fe8245b6177e285ac63e06760db4e2ff0d2adff06ce191d7f9affea8ec596ae5b9edddc6130b339af9e2e9246c1357cf91a800151b0ab6a726722ab000c92df3063f80003a4f1e834b4fd174b31739c9e8feb28ca8d6210141094561067bfe53bc9185613d9554111a1e4c9cf05c89ca50d253a4cb034dea90168fd4b24d6f0f80bc21da302cd955a6887f47978feef393caef0583bbd1cdf49d4abdf8c53f05a0741651be2a0918d18467dd34bc24c754b5ee61728ffff8332d0256", 0xf9}, {&(0x7f0000000140)="1d478904404ab14b9e93c309d16f9058c6776764e6a26e116f5cdc1ed9ac11c1668c5f784902a14ba3c8f159da18317a34910b", 0x33}], 0x4, 0x19) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r4) r5 = openat$watch_queue(0xffffffffffffff9c, &(0x7f0000000000)='/dev/watch_queue\x00', 0x0, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r5, 0x5761, &(0x7f00000001c0)) r6 = openat$watch_queue(0xffffffffffffff9c, &(0x7f0000000000)='/dev/watch_queue\x00', 0x0, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r6, 0x5761, &(0x7f00000001c0)) r7 = dup3(r5, r6, 0x80000) ioctl$VHOST_GET_FEATURES(r7, 0x8008af00, &(0x7f00000004c0)) r8 = socket(0x1, 0xa, 0x80) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="180000004a005f0214f9f424000904000a", 0xb) splice(r3, 0x0, r4, 0x0, 0x10000, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x29, &(0x7f00000001c0)={0x101, {{0xa, 0x4e23, 0x401, @remote, 0x4}}, {{0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x108) 18:22:08 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) r3 = openat$watch_queue(0xffffffffffffff9c, &(0x7f0000000000)='/dev/watch_queue\x00', 0x0, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r3, 0x5761, &(0x7f00000001c0)=ANY=[@ANYBLOB="b2bb92a06294dcaa"]) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000540)=@nat={'nat\x00', 0x1b, 0x5, 0x5a8, 0xd0, 0x1f0, 0x1f0, 0x0, 0x0, 0x510, 0x510, 0x510, 0x510, 0x510, 0x5, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x10, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @icmp_id=0x65, @icmp_id=0x67}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0xb}, @dev={0xac, 0x14, 0x14, 0x17}, 0x0, 0xffffffff, 'eql\x00', 'ip_vti0\x00', {}, {}, 0xff, 0x1, 0x40}, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x7}}, @common=@icmp={0x28, 'icmp\x00', 0x0, {0xe, 0x2, 0x5}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x8, @rand_addr=0x1, @loopback, @gre_key=0x7e, @gre_key=0xbd9}}}}, {{@uncond, 0x0, 0x218, 0x250, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0x6}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv6=@empty, [0x0, 0xff000000, 0xffffffff, 0xffffffff], @ipv4=@multicast1, [0x0, 0xff000000, 0xff000000], 0x4d6, 0x3502, 0x62, 0x1, 0x65e644c6078d10b3, 0x8}, {@ipv6=@mcast2, [0x80ffff80, 0xffffff00, 0xffffff00, 0xffffff00], @ipv6=@rand_addr="19dcddf92b09eadea9212f5cfaa6723a", [0xffffff00, 0xff, 0xff, 0x100000180], 0x4d6, 0x0, 0x4, 0x0, 0x4}, {@ipv4=@loopback, [0xffffffff, 0xffffffff, 0xff000000, 0xff], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, [0x0, 0xff000000, 0xffffff00, 0xff000000], 0x4d3, 0x3501, 0x1, 0x0, 0x38, 0x19134ea85c9a841f}, {@ipv6=@loopback, [0xffffff00, 0x1817fff00, 0xff, 0xffffffff], @ipv4=@loopback, [0xff000000, 0x889f4d0a416fe56f, 0x0, 0xffffffff], 0x4d2, 0x3504, 0x88, 0x1, 0x5, 0x12}], 0x2, 0x2}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0xc7e1412668e1429a, @remote, @broadcast, @gre_key=0x3, @port=0x7fff}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x1b, @multicast2, @local, @gre_key, @port=0x4e24}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x608) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd24f24b3ac273c81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a4fa21e76fc4d05e107ac82d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac"], 0x6a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 18:22:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'broute\x00', 0x0, 0x4, 0x2b, [], 0x1, &(0x7f0000000080)=[{}], &(0x7f0000000100)=""/43}, &(0x7f0000000200)=0x78) getdents(r0, &(0x7f0000000140)=""/46, 0x73) 18:22:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x209) [ 255.687800][ T9842] bond0: (slave bond_slave_0): Releasing backup interface 18:22:09 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) sched_setattr(r0, &(0x7f0000000340)={0x30, 0x2, 0x0, 0x800, 0x1, 0x2, 0x7ff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="50000000280021f72c53ca770400000000000000", @ANYRES32=r5, @ANYBLOB="ac06000000000000000000000c0080eb8600007293700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f6f1d464c214769c41a5ddc42358257172f7356208a1e3de17e24bac87fabd303c2e5eba5708f93eca1ccbed704"], 0x50}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 18:22:09 executing program 4: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000100)=""/142) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'ip6erspan0\x00', 0x4}, 0x18) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmmsg$inet6(r1, &(0x7f0000003b80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000480)="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", 0xf5}], 0x1}}, {{0x0, 0xfffffffffffffdf4, &(0x7f0000000740)=[{&(0x7f0000000440)='&', 0x1}], 0x1}}], 0x2, 0x8000) 18:22:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x209) 18:22:09 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x108080, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpgrp(0x0) ioprio_get$pid(0x2, r3) write$cgroup_pid(r2, &(0x7f0000000300)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r4}, 0x0) r5 = getpgid(r4) syz_open_procfs(r5, &(0x7f0000000080)='net/ptype\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) 18:22:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xc}]}, 0x2c}}, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, @hci={0x1f, r6}, @nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x100}, @isdn={0x22, 0x1, 0x20, 0x7, 0x3e}, 0x9, 0x0, 0x0, 0x0, 0x800, &(0x7f0000000080)='veth1_to_bond\x00', 0x1f, 0xbdb, 0x8}) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000200)=r7) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x8000, 0x0) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0019b1a10494245ca5f971b9ec8a51a3f2f678d50a08eb09000000e6d28d937c0700000056e4b6481754f63c4c73e3a16bb6e6ea1bf57caf25775d5c04d733014acfe25024a4566f86b1c46bb43b2a1f000000000000000000808c0c5d1ad33c2363e53c46d3199a5adc6b21c67734bc00"], 0xfdef) 18:22:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r4 = dup(r2) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x18, r3, 0x1, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r3, 0x6c14230d8544c17b, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10, r1, 0x0) openat$cgroup_procs(r0, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x2, 0x0) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000140)={{0xc, 0x1}, 0x7, 0x7f, 0xe, 0x3, &(0x7f0000000100)="2ffa7b72daef6dea3496eb0a98fd"}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x3c5) r5 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r5, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r5, 0x10f, 0x86) 18:22:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x209) [ 256.352714][ T9888] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 256.392124][ T9888] BFS-fs: bfs_fill_super(): Inode 0x00000005 corrupted on loop5 18:22:09 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@ipx, &(0x7f0000000100)=0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000340)=[@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, @in6={0xa, 0x4e21, 0x4e, @loopback, 0x800}, @in={0x2, 0x4e23, @broadcast}], 0x3c) getpid() r1 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r1}, 0x0) r2 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r2}, 0x0) sched_setscheduler(r2, 0x0, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x400, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) sendfile(r0, r3, &(0x7f00000004c0)=0x5fe4, 0x8) fchdir(r4) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r5 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r5}, 0x0) timer_create(0x7, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r5}, &(0x7f0000000040)=0x0) timer_delete(r6) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r7, @ANYBLOB="0e726f6f7c303030183075b778525f4f640000005dfdc07524e9c8a72e8cd3cc867000000000000051fa05de5b7558f5dac5ad6c6fb32d1cfa6dab56e96f1b96b6b904b855a028fbae7b8a5c5fed9ba5678b18ec52ef1c9f1d0f2e022323fc435101", @ANYRESDEC=0x0, @ANYBLOB="2c6772b1da7ec069643db06a53dcef9e0b57ac558af2ac18f88370681dd48098efe3efb84bdd17ae19777adcb5486c50417af45c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 256.493985][ T9892] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 256.542423][ T9892] BFS-fs: bfs_fill_super(): Inode 0x00000005 corrupted on loop5 18:22:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000000080)="290000002100194000003fffffffda260200000000e80001040000040d001400ea1108000425009700", 0xff2a}], 0x1) r1 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r1, 0x0, 0x0) r2 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r2, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/176, 0xb0}, {&(0x7f0000000200)=""/224, 0xe0}], 0x2, &(0x7f0000000300)=""/152, 0x98}, 0x140) r4 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r4, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, 0x0, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7f}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x10) 18:22:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b2, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x501000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="38000000240000012abd8b00fbdbdf250000000000000000", @ANYRES32=r3, @ANYBLOB="0600f3ff0e00f2ffe0ff020008000e00020000000800050002050000"], 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x8000) [ 256.930223][ T9894] bond0: (slave bond_slave_1): Releasing backup interface 18:22:10 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x108080, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpgrp(0x0) ioprio_get$pid(0x2, r3) write$cgroup_pid(r2, &(0x7f0000000300)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r4}, 0x0) r5 = getpgid(r4) syz_open_procfs(r5, &(0x7f0000000080)='net/ptype\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) 18:22:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00\xa3\x9d\x04tYH\xe14\xad\x01\x91C\x90t\xb9\x17\xd8\x87\x1cp\x9e5\xe5\xafF\xc6P \x97\xf3u\x8d\x86\xd6\xc5\x9e\x0f\n\xe1\x9c8\xcf\xa2k\x9b\x0f\xb0\xd1K\xdf_>\xe12`\x9a\xc2\x05\x84\xdc\xa2\xc9]`Q\xa1Q\xf8\x1c\x97J\xbc?\\\x06\x0ey\x9bQ\x12\xcb\xe0\xbf5\xc5\xad\x9e\x04\x8d\x18') ioctl$int_in(r0, 0x3eeee0c2d54b2197, &(0x7f0000000000)=0x9) r1 = openat$watch_queue(0xffffffffffffff9c, &(0x7f0000000000)='/dev/watch_queue\x00', 0x0, 0x0) r2 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r1, 0x5761, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000200"]) dup3(r1, r0, 0x0) fchdir(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) 18:22:10 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) sched_setattr(r0, &(0x7f0000000340)={0x30, 0x2, 0x0, 0x800, 0x1, 0x2, 0x7ff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="50000000280021f72c53ca770400000000000000", @ANYRES32=r5, @ANYBLOB="ac06000000000000000000000c0080eb8600007293700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f6f1d464c214769c41a5ddc42358257172f7356208a1e3de17e24bac87fabd303c2e5eba5708f93eca1ccbed704"], 0x50}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 18:22:10 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x209) 18:22:10 executing program 5: syz_open_dev$evdev(&(0x7f0000000080)='\xff\a\x00put/eveft#\x00', 0xc, 0x28001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3000000, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800004000"}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in={{0x2, 0xfffc, @multicast2}}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1052, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000340)) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000280)={0xf3d0004, 0x2, 0xea, [], &(0x7f0000000240)={0x0, 0x200, [], @p_u32=&(0x7f0000000200)}}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x102000) io_uring_enter(r5, 0x0, 0x0, 0x0, 0x0, 0x0) socket(0x3, 0x80000, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1\x00'}, 0xf62c3dc8da425be8) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) r7 = socket(0x40000000002, 0x3, 0x2) bind$rds(r7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000180)={r6}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="e7005084c82bbbc966832f952037fd9a7109192e7c08a9e5cd20700ca630571532f2f41bce4b43ffb272310c0211549ba0874e5d01000000350269e3aa20c1d4d9c2c850737a6900f2c2af9cd77cac6e0b2f68f423f657c36153a9596e214e4f91e12f2770d100"/114]}) sendmsg$IPVS_CMD_GET_SERVICE(r8, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="5f015f00", @ANYRES32, @ANYBLOB="080029bd7000ffdbdf25040000000c00010008000900510000004000020014000100fe8000000000000000000000000000bb080003000300000008000700ff00000008000e004e240000080002004e24000008000400"], 0x3}, 0x1, 0x0, 0x0, 0x200008c1}, 0x4000) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x2000044}, 0xc, &(0x7f0000001140)={&(0x7f0000000bc0)=ANY=[]}, 0x1, 0x0, 0x0, 0x4001}, 0x40002) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x7, {0x0, 0x100000000000001}, {0x2, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x274, 0x0}}) 18:22:10 executing program 4: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000080)=0x1f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SIOCX25SSUBSCRIP(r4, 0x89e1, &(0x7f0000000280)={'rose0\x00', 0x3, 0x7}) syz_genetlink_get_family_id$ipvs(0x0) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000380)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) r5 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r5, 0x0, 0x0) r6 = socket(0x22, 0x80002, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@loopback, @in=@remote}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xffffffffffffff31) getpeername$tipc(r6, 0x0, 0x0) r7 = socket(0x22, 0x80002, 0x4) getpeername$tipc(r7, 0x0, 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x11, &(0x7f0000000600)={@empty, @remote, 0x0}, &(0x7f0000000640)=0xc) bind$can_j1939(r3, &(0x7f0000000680)={0x1d, r8, 0x2, {0x2}, 0x1}, 0x18) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 18:22:10 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x108080, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpgrp(0x0) ioprio_get$pid(0x2, r3) write$cgroup_pid(r2, &(0x7f0000000300)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r4}, 0x0) r5 = getpgid(r4) syz_open_procfs(r5, &(0x7f0000000080)='net/ptype\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) 18:22:10 executing program 2: write(0xffffffffffffffff, &(0x7f0000000140)="2400000019005f0014f9f407000909000a0080ffff02000000f000000800040005000000", 0x24) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8a400, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) [ 257.504328][ T27] audit: type=1800 audit(1576693330.802:32): pid=9940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16605 res=0 18:22:10 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x209) [ 257.597001][ T9945] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 257.656147][ T27] audit: type=1804 audit(1576693330.802:33): pid=9940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir134299370/syzkaller.PhOnoo/20/file0" dev="sda1" ino=16605 res=1 [ 257.692383][ T9940] minix_free_inode: bit 1 already cleared 18:22:11 executing program 2: socket(0x10, 0x0, 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9a0e750d18000000000000004c0000004c00fd0004000000000400000800000d000000001000000000000000090000000300000000000000010000000000000001f00000000a0000000200000004000000000000000b000000000000000500000000001732e3552a"], &(0x7f00000003c0)=""/4096, 0x68, 0x1000, 0x1}, 0x20) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r0) r1 = msgget(0x2, 0x0) r2 = msgget$private(0x0, 0x604) msgctl$IPC_INFO(r2, 0x3, &(0x7f00000002c0)=""/222) msgctl$IPC_RMID(r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:22:11 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x121880) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={{0x1, 0x0, @descriptor="a4038fd266d354bb"}}) ioctl(r0, 0x2000004140, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x10000) 18:22:11 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x121880) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={{0x1, 0x0, @descriptor="a4038fd266d354bb"}}) ioctl(r0, 0x2000004140, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x10000) 18:22:11 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x121880) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={{0x1, 0x0, @descriptor="a4038fd266d354bb"}}) ioctl(r0, 0x2000004140, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x10000) 18:22:11 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x2, 0x0) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000140)=0x40) [ 258.365669][ T9979] overlayfs: './file0' not a directory [ 258.510610][ T9943] team0: Port device team_slave_0 removed 18:22:12 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) sched_setattr(r0, &(0x7f0000000340)={0x30, 0x2, 0x0, 0x800, 0x1, 0x2, 0x7ff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 18:22:12 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x121880) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={{0x1, 0x0, @descriptor="a4038fd266d354bb"}}) ioctl(r0, 0x2000004140, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x10000) 18:22:12 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x2401, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x7216ff91cb9f272b, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x56de}, &(0x7f0000000140)=0x8) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000002e00815be00f80ecdb4cb904084865160800030014000000000004140e000a001500cd5edc2976d153b4", 0x235}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:22:12 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x209) 18:22:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000280)={0x1, 'syz_tun\x00'}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'bond_slave_0\x00'}, 0x18) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) close(r1) r2 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f00000000c0)={0x8000, 0x2, {0x1, 0x2, 0xfff, 0x0, 0xc5}}) 18:22:12 executing program 5: r0 = socket(0x840000000002, 0x3, 0x3) sendmmsg$inet(r0, &(0x7f0000001c00)=[{{&(0x7f0000000000), 0x10, 0x0}}, {{&(0x7f0000001340), 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_retopts={{0x28, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x4, [@broadcast]}]}}}], 0x28}}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x6, 0x8, 0x18, 0x7ff}, &(0x7f00000000c0)=0x10) 18:22:12 executing program 3: r0 = syz_open_procfs(0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) [ 258.974019][T10000] IPVS: stopping master sync thread 10001 ... [ 258.980792][T10001] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 18:22:12 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x121880) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={{0x1, 0x0, @descriptor="a4038fd266d354bb"}}) ioctl(r0, 0x2000004140, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) 18:22:12 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20032, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setxattr$security_selinux(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:power_device_t:s0\x00', 0x24, 0x3) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f00000001c0)='system_u:object_r:iptables_conf_t:s0\x00', 0xd1c686ac156881a1, 0x0) getresuid(0x0, 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 18:22:12 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x2401, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x7216ff91cb9f272b, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x56de}, &(0x7f0000000140)=0x8) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000002e00815be00f80ecdb4cb904084865160800030014000000000004140e000a001500cd5edc2976d153b4", 0x235}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:22:12 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x121880) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={{0x1, 0x0, @descriptor="a4038fd266d354bb"}}) ioctl(r0, 0x2000004140, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 18:22:12 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x121880) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={{0x1, 0x0, @descriptor="a4038fd266d354bb"}}) ioctl(r0, 0x2000004140, 0x0) [ 259.794646][T10005] team0: Port device team_slave_1 removed 18:22:13 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) sched_setattr(r0, &(0x7f0000000340)={0x30, 0x2, 0x0, 0x800, 0x1, 0x2, 0x7ff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 18:22:13 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x121880) ioctl(r0, 0x2000004140, 0x0) 18:22:13 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4020000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@getqdisc={0x38, 0x26, 0x0, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, r1, {}, {0x10}, {0xc, 0x6}}, [{0x4}, {0x4}, {0x4}, {0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x20000004) signalfd(0xffffffffffffffff, &(0x7f0000000140)={0xfffffffffffffe00}, 0x8) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000050}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:22:13 executing program 2: setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) socketpair(0xf, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) 18:22:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x7, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x0, 0x0, 0x10001, 0xa9}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000004c0), 0x0) getrandom(&(0x7f0000000280)=""/113, 0xffffffffffffffda, 0x3) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000080)) set_mempolicy(0x2, &(0x7f0000000040)=0x5c9, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/rt_cache\x00') setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x0, 0x0, 0x1000, 0xc324}, 0x10) sysinfo(&(0x7f0000000300)=""/224) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x421b, 0x0, 0x3ff}, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) readv(r2, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 18:22:13 executing program 3: r0 = syz_open_procfs(0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:13 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x2000004140, 0x0) 18:22:13 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) sched_setattr(r0, &(0x7f0000000340)={0x30, 0x2, 0x0, 0x800, 0x1, 0x2, 0x7ff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 18:22:13 executing program 3: r0 = syz_open_procfs(0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x7, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x0, 0x0, 0x10001, 0xa9}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000004c0), 0x0) getrandom(&(0x7f0000000280)=""/113, 0xffffffffffffffda, 0x3) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000080)) set_mempolicy(0x2, &(0x7f0000000040)=0x5c9, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/rt_cache\x00') setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x0, 0x0, 0x1000, 0xc324}, 0x10) sysinfo(&(0x7f0000000300)=""/224) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x421b, 0x0, 0x3ff}, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) readv(r2, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 18:22:13 executing program 4: ioctl(0xffffffffffffffff, 0x2000004140, 0x0) 18:22:14 executing program 4: ioctl(0xffffffffffffffff, 0x2000004140, 0x0) [ 261.396586][T10048] device hsr_slave_0 left promiscuous mode 18:22:15 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) sched_setattr(r0, &(0x7f0000000340)={0x30, 0x2, 0x0, 0x800, 0x1, 0x2, 0x7ff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 18:22:15 executing program 4: ioctl(0xffffffffffffffff, 0x2000004140, 0x0) 18:22:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) mprotect(&(0x7f0000465000/0x600000)=nil, 0x600000, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000200)=@gcm_256={{0x304}, "7592c4f70cb75400", "3bbcd03c25e644fe58255eadd022573b74204c9aa4ae019109c231a8c8817437", "31769c91", "f3989699c125626c"}, 0x38) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000440)='cgroup.procs\x00\xad\x96\'4\'*\xcd\xb4z\x00`\'\x93\f\xa9A\xe1-\x0f\x91v\xbe\xce\x1b\xfd+B<\xf6\x0ep\n\x8b#\x9e\x06d\xac\xadB\xc8\xf1Q\b\xf50j\xb8\xe9Cy\x01\"f\x1b\xa3tc\xb7\x0e\xd43\x14\xe8yOvl\x11B\xe5\x83\x114\xc9 gSaO[\xabt\xfe\xea\x0em\x1c4VQ\xa8\xa0\x9e`r]\xec\xe3u\xa4n\xff\xddi\x92\xd8\x830\xdf\xee\xfd\x83ED\x97\xa9\x02\xf0\x96\xbc9\x10\xa1RZ\x92\xf5xx\x06', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000080)={{0x0, 0x6}, 'port1\x00', 0x4, 0x101021, 0xffffff80, 0x4, 0x3ff, 0x8000, 0x0, 0x0, 0x5, 0xa00}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='Vigemap\x00Q\x0f\xcck\xcf\x9a\xe0\xc9\xaezkb\x81\xe4\xd6\xd6\x13h\x9a\x10\x18\xda\xcc*\xc8\x02\xc0\xedQ\xb9\\\xfc\xeda\x02') sendfile(r2, r4, &(0x7f0000000040)=0x100060, 0xa808) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f00000002c0)={0x5, 0x1f, {0x55, 0xecc, 0x6, {0x1a, 0x8001}, {0x2, 0xffff}, @period={0x5d, 0x47, 0xc50d, 0x401, 0x3, {0x7f, 0x0, 0x0, 0xfffc}, 0x1, &(0x7f0000000280)=[0x3]}}, {0x0, 0x3, 0x5, {0x8e, 0x200}, {0xc37, 0x5}, @const={0x2, {0x7, 0x8, 0x3, 0x8}}}}) ioctl(0xffffffffffffffff, 0x9, &(0x7f0000000500)="942fa1307ae8475cd9cefaf318e6e96d28e712ca8ce69eba071fb1529561e6113f9b01988febf85534a2cb73d9562d11d0fba1470005d6a56bb3abc8bf606b322dce6933f52e1b9600abbc8c17e67f0ce008d11d8e63709d512e6a9006dc3b06b25b427b47b3953bb1348148cbc29676039f3f24caeb48aad5baefcc44c26e174118bd4b61abb03f5d9045fe302564f0ba5de1b28538c5f87cf8bd9e9cc48d065ca36c70ec688c4a5971989f8878b7a380711153aeb68732c4e6af4c02701f059e6c0bd8c18feb8336f041b8289513b56f120c1552068cfb93c35c608cd86883f710de6fa8e54a3eb053069a9db5c725caa2d46b174cb2082fd0ee0898caed167eee08ebcb4b5121f58e7cd80b18e09351b109c440496d634312116a4b8c5eb156c4e052081eb7d6653896af0c4665294cb34b4a98ab3968819b43a204fb47aa972c355436ac0226794be8e5f39ed0eea8072958eb9bca5cf33ce3a56e36d449cff63caf7428edf8d6de72a7843754d72b77e50306c40c47979d20a4992d2b422ae793469bc71aae6868e4628fa80bef5c9e0b1102963e3db57b154c58436bd3ee9834eb36059c3c930734ee2622df0766961c648f3a3158feac5ff21c6d8cbde6a14ec7b521cbf2f111a48eaa9f805dc8e6460570000d4e5281adec1de69389b671df0beec3b9c6d7d2ef6c22a20f24fd63b126c0d4edbe540ed83a93401a10a1cfda65bf74c406512047402e5d4262a942e515a3204b0053aeca38a8473ec7d7500a2e23ee1a90bb7e8731b7e6300db3e8cda283b1e6394b9d47c1603ebc02baf6a9943e3142d229a6feb093e65f9ba97ad01ae4edb17c08b07b2f37827b651d4937a44032f7a42bee30fb8b57a4fd31e1c1c99613e3f417873107096b4994722d0f74effe1941ea6211f9fbc73efb3dcc2f944b726d85621431a4c2fadb38bdc5d2003f1e2c3ee872072d33d7504bdcc0b5c34ea6a2ed6afe973acb61299262a91163172576e28d80f52ab4b2e3905d25c519b3fdcca1ace1dde95019b7c2768632a7b0213f6bde9880de1182d74ee697246444b4bb35be95708b30afa86cc869d49d8f4d1f462fecad60b24ae49b82b323881c47a689ed006d49b04e62e0cfb41ba7a58ea382f19566f2cebcfdadd9e3655d35afe9ad5318df130a1f69281d91577687cdf0978c5238e577286487a58f62c1e0f13971a318ae967a81fcdd89b1669c65360fa70a848986481816cd16270e78eeae963ab73c587b88ea09fac11133c9e84de9492cae373e4e6e949647be78a81f28669bdc2e0516f54271d627732065404e98e7d04afa244293e9833fe71ebd9b0a7b207bcc18766408201f41196f2aeb3b9f79ccdda51c721f39540947ac1828246d0e80ad258f58dff40d78f06c61e1cdac350991446d915c0813618297353dee5ef5e6f4e5d8217c56c5e61b835a6ae1f04e3df28497ae10b60f02e5ce64d8c0a61df38fdfc9cd3f07ca3cd07bd8a9e739979a918e17e931ac2bc715b98ba7b2dcf6049f8184d96145b31fb9ef5420ee76c180428401b61944678ccfb8174b758b44a5648ccb25913805577ff52235a5f88b91ea58ddf3bce3a6206fc709bcb1366356d4bd31ce86dfed1d21553166083e52b93e6d1061b9f7bde28fb3b77bce8735e6746f987d0b714f8cf152b6d962fb9042dbde99fc54dd1a51f88e0453f2caa1984b7a32a7bef807cc778c5fef93afa60eabc7a4ce0805510103e2063dce30b700fde4af87bcb4ab8219bc9b164265577192a7205696da32d9a785b8d34e520e493a3507676c94c6d93382d7536a2c4668ee2118b072c732859cded2000cce5b4dd42d4ff8d8a219b81448e6894fa3339ee8b9937cb1d064f002ea2ed67688e679787bdf30a0f322b1f9bd6aade71dbb8f857d9307b0af2b4b431e3408db243456f0ceb5b15e850cd0606c48656abcbb3153c53f16092dbbb87a081169db2ee58bfe34092b569db35a3b166c985f3428f8bcc78beecb34b8d0827e8be150b6926a9951782fcbe1154e3a053b846c6613881e59e7c0e19216deefb232a812d49ea8f171581af93266ccb895f43a6299d42621d2c24abd8b0f2edbef7a0d86ce66e26727508ed702c76235cdcb5427185c65373c331e1c52fb69fac1dcc47ddd428676a99d62c86d02a6f90dc5066c362359445e789a51efd4aef7f01ee2ce8ba81280648520d091094bf5c7ca0ea0859b38f3f1a06f312cac61642c710af65d24e1c377127371be48555d63cbfc82ab9277bde50d3b39b454a5492efa580bdc04af745d9f0f5d769647cf9d8815f92a6127da887dc5676d88f19fc445090b88b04a101d937f1ed46a8c3353b2f9a273c9771a161d3ad88164c914c7bd1f755639c77941a1ec347f5371c0d79e7a571136d5ef9b079174326de4075250b010b00c7815ea7f79f9e6e996d311e7d7a09d658801ce6515fe9f52d593c251a571c5f0a9e352a14929aaa830840c55834cd887a4507789098594e55716ec4899db5cfed1d5d0b93e8f6bdfedbcb09a3ebf0d201e6410a5f13fe3befb34fe60b8d00ece6ed37605369358bc4b3a57e0b191759954da24338e2622930c2efb04993e5786991da2785c23ddafc51d0042b3704ecfb789e3cea94ea497f0da1537194f91f5ccadc44d79d0008d8827208265855244f3d18d0d11d78ffb3325a19e95e3547736542980556880259c3a854d94ac3e269804a499444f83c46c766229288289ec41f2fa47bd2efa325e867e74a43c30e5be450d48519c60cb978ff4df7a9e8c6727a4a44c66178103cd514fb7ba6dcbe25f3e540089a6b49f649ee47bc306852964bc0afabbb2b1fa8eeb005ab1da9abdac716e416d7de27b2bae0feea539de4321f6c8a754eb9ae31f5c5171b400efe41c2bbc909ad0a549ce9fef58ad125db6118fbd2a9f23a6af76902939c351a534ef4196c0c3c2a286973bb564667ff757017b2ab20a91ee85c8daf9502bb19bbcbed550c094af1f47a987f9c5bf91b3d5466026459616514b91fea01ca35072ea392b255f9e69a5ae8578460351f02e65c55756aedea3e1daf0faefaf3f1b7f8c6a27f598b28214e18ac8ab8f44f2d120e91016180b0397d821cf415eabd31400a927ff36817283a07c8d80d7808141df591be41ca6c733a79a341809d9a4ffb341af216ab3d4a072a2919658c2431d16f37dd2d31f5d1040d3b750dd1d36cffc447bd944d23c167a0e55a91fcf07136137ee125b75edd1533b024d8946b770b332bcfe5a1b87587feb71ad0281650d68f907aa358a81ba3b1ce087c7f94b78e5b7dff4d2283f767c4339e2ceaa89424f1742e2dfea6e6bd20aa49138b03f079ca8790534389f76459bb522932b88af6c918e8e8f4f008e0c0459213784cdb1d13a560617857ad54d808f5f58edb21ee1bdb0315cf2f726f1e8dc59f794c68a8240ea8ae5d40136ee09ecff88ee96a118a90d9f52bc9031dafe8b0b5f0093c189a9ccdfbf67af9a88b337075bad3cc8e0ae6e75790781ff0bc79c0fe65dd3c634b0e629f6f435c366cc3cd3aded2d1c35086b3077d234f93cad27df2b050169b61b97161722a2227cb735e07860a62211ee3fc29773cd6f74008dca4d5cffecd1a7443764f7d5b868e330e2c728d21e9757d70865729d8a26d03b28686f4d486da74e0834dc3f201fda015b4acd7e75dda2c1dab085da390467449393a94447eec086834f5dcce997811a9237728f82289270215a1fd38396a1ed26d7931a6dcc974e1f2960f5495dacf3b2cf4ae283c260f780a53b2c2a4cdea9c822aa92e60d225470f41f947dbe2c9d41bf778b1e8bfe6b9d9576c386ffc8023c2a3a895360edfacd3401dbd8da61f850cbf1b36807e9d01276d6b8fa2c865454abab1f26020bd4cd13e2ac2f85840d9f60d68b388b8c07950899d610b461bcec12c86cba875dfd04e3f9e715840459b7241dd72252c631b0221aba7b444cf8948c4c74a7cc38ee754309f66deb0181644bce9ddf46ed8c61dd2c2b7d539dfc3abb6c278660477841bc39120f2cb86794ebab8d643bea79222791ec80f4d62bdf79809c7aba587b06acec9b54475a1063639bbca67eddd2e1f93c2f202599cea4d8eee242b5e591ca3de178526f074fefa83da08367d34284aaaa1a31653d33baac1ac2c83aa255caa9e5b1a86e85c07773abece1fd4f05345b628a678862bed6f2ff7f27c605039fd535ec0822b4eb9568b2e9f6e5ef7c891d3590e8dc34832fd598a284a25df0e898f0ab067bbbe5ad415dca00e4b23c31bf0a099e1861dd053427600d797517ec6a0acfc419a06045daa96a846394fd50c0732bc2140f0fb9b7b8de60cc1fa5f117d2b5432f7c535441c81454563bad677cc4090235881167c11e94d2902d16825612ef92499071a927e9885d8ecb77f014f1334ebd53989299ed14437fd3009045c9b4693729b7a33f20a3ae69f91a13797a5c1055d4255ec062878d4ec31437d9cff59804567c96ccab0c7a998ceef63cda6c9f23aa30b75ff6850e2ab5db7660e9cb3a0b66997d882a909f6afc7c064f831eb510b2195420b8f2dba284d35591274c22e8a3f5f5488182a8ba37275ebfa8b882aa10dbc3298320b68d330ea5e9127eed94cfe7527ab71c65e59ade9623c41af8e424840858d343d723392331505488c7cab6a29d7dc046ec0be413ac632d91ce8d1bdd8b7f63fccb725e6232519c4b06230c60daaa6a20e64a9c321cc8d0cde1c984d0fe0061ef17602a08c14a29f48e864228723d4d57205e98c21f1c2c23a3f3067c847294a30fba8cd05be9fc06b753170bbdaf710f670ab18323ab0045f9b630be43f0b3c870e6586f5d1d70e74812d739702c5d42cd7ada25f163044c493500903802f4316cc212ceab2f4eea98588a3e1b62ec5ac1f8a3d703084c69bf11364512fe25a54af7e60229f3ebd8661020167cefdd5f71b97465cd92c14771bbb747cee32bc3378d4b02643f38fb278af9ff8401ca068789d0b7b8500443e42bc78a936d3c7f57073b65887bd56d887ea49cf8b345b54127286d7e93dbbb1129888d949dfde80df10f84e8e24f35b38379b1453d6959e1baeee87f67e185273aa63c35734ceec3443a84ca0c74d6489daf31115bca62d4c99d5cc8cc53c70df064485c999e5ad09675852c29ebf13c44534b562ddd1907a4b7dd90ce15be1bc762d0c2758ed2db87afa39bf5604374750a84ff0c05081eab94bfeb2227721cd0243efb8fc12fd3fb915d7c04529696d9a7a9b8218b52c0383a02e29c629da8ecf01dd808772fda94f9341dcdbdb6a0e9c8da8532a1d30f4312fa7ca34ffc2d3b357fd6de776aad35cdab3e9c87594bc8384e1479f0a65dc37c413f3fabd71ed1bab05f7a86d8303c654717a21c3f4f4bc44512befddcea538441b40b998b7d3b97f9bdb0a62157c5fa7dffa5dffda4b41f7ed6161fa5a244186d44919ad2dfc35e3cdac85d1fe714c894d292e5cf19f722f9b6ed8fb2d45e22d0a88f276cbb6c21b78ae59fa1850deccead1c551b92c39202c61ce08a66b5a922e859baba7f5822decaba29a88b6506ea2e2d1a1be128273d7a2c96741c77b9cb6b6cc2410cf845098461fc1c6949b456091516b5f85ff8967c48e6e18e6bbdb079a927f68a9c552b1c4dc59a0c4d0895ecdfa31af0bff7adcd4918df398b171cdf1d12b66dd1a70cca38fa12ba67b26f17ec8b970f0574a5ac342145e5885bbf0e43e8d08f4c58715008ab5d69709227718e29442fa910d6134cd547d0d4146950640bdc5085") socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) quotactl(0xfffffffffffffffb, &(0x7f0000000180)='./file0\x00', r6, &(0x7f00000001c0)="c11636bc7a6ba048512c0774155d84") 18:22:15 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4020000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@getqdisc={0x38, 0x26, 0x0, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, r1, {}, {0x10}, {0xc, 0x6}}, [{0x4}, {0x4}, {0x4}, {0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x20000004) signalfd(0xffffffffffffffff, &(0x7f0000000140)={0xfffffffffffffe00}, 0x8) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000050}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:22:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(0x0, 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000001180)='threaded\x00', 0xfc9a) fallocate(r0, 0x0, 0x0, 0x10001) r1 = openat$watch_queue(0xffffffffffffff9c, &(0x7f0000000000)='/dev/watch_queue\x00', 0x0, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r1, 0x5761, &(0x7f00000001c0)) watch_devices(r1, 0x3f, 0x0) fallocate(r0, 0x3, 0x5e00, 0x2cbd) creat(&(0x7f0000000100)='./file0\x00', 0x0) 18:22:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000440)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000180)}}], 0x1, 0x910) getresuid(&(0x7f00000004c0), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@aname={'aname', 0x3d, '/dev/dmmidi#\x00'}}, {@fscache='fscache'}, {@cache_mmap='cache=mmap'}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@euid_gt={'euid>'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/dmmidi#\x00'}}, {@obj_role={'obj_role', 0x3d, '/dev/dmmidi#\x00'}}]}}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000300), &(0x7f0000000340)=0xe) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa001421}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x3c, r3, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8001}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000200)=0x4) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x3c48, 0xd}, 0x8) lstat(0x0, &(0x7f0000000840)) syz_open_dev$sndseq(0x0, 0x0, 0xe800) 18:22:15 executing program 4: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x2000004140, 0x0) 18:22:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r1 = open(0x0, 0x141042, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x209) 18:22:15 executing program 1: socket$alg(0x26, 0x5, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800b6064da7f3e624c70b000800000000000000e3245b03"], 0x18) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1fd}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 18:22:15 executing program 4: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x2000004140, 0x0) [ 262.256807][T10094] ------------[ cut here ]------------ [ 262.281875][T10094] refcount_t: underflow; use-after-free. [ 262.336048][T10094] WARNING: CPU: 1 PID: 10094 at lib/refcount.c:28 refcount_warn_saturate+0x1dc/0x1f0 [ 262.345558][T10094] Kernel panic - not syncing: panic_on_warn set ... [ 262.352156][T10094] CPU: 1 PID: 10094 Comm: syz-executor.5 Not tainted 5.5.0-rc2-next-20191218-syzkaller #0 [ 262.361934][ T4106] kobject: 'loop1' (0000000054fbfd07): kobject_uevent_env [ 262.362074][T10094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.375229][ T4106] kobject: 'loop1' (0000000054fbfd07): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 262.379348][T10094] Call Trace: [ 262.379367][T10094] dump_stack+0x197/0x210 [ 262.379388][T10094] ? refcount_warn_saturate+0xe0/0x1f0 [ 262.379404][T10094] panic+0x2e3/0x75c [ 262.379421][T10094] ? add_taint.cold+0x16/0x16 [ 262.379449][T10094] ? __kasan_check_write+0x14/0x20 [ 262.379461][T10094] ? __warn.cold+0x14/0x3e [ 262.379479][T10094] ? __warn+0xd9/0x1cf [ 262.424739][T10094] ? refcount_warn_saturate+0x1dc/0x1f0 [ 262.430295][T10094] __warn.cold+0x2f/0x3e [ 262.434552][T10094] ? refcount_warn_saturate+0x1dc/0x1f0 [ 262.440107][T10094] report_bug+0x289/0x300 [ 262.444455][T10094] do_error_trap+0x11b/0x200 [ 262.449059][T10094] do_invalid_op+0x37/0x50 [ 262.453477][T10094] ? refcount_warn_saturate+0x1dc/0x1f0 [ 262.459014][T10094] invalid_op+0x23/0x30 [ 262.463159][T10094] RIP: 0010:refcount_warn_saturate+0x1dc/0x1f0 [ 262.469315][T10094] Code: e9 d8 fe ff ff 48 89 df e8 11 3d 23 fe e9 85 fe ff ff e8 77 52 e5 fd 48 c7 c7 60 d8 6f 88 c6 05 58 8f ec 06 01 e8 c3 e0 b5 fd <0f> 0b e9 ac fe ff ff 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 [ 262.488902][T10094] RSP: 0018:ffffc90007ef7d40 EFLAGS: 00010282 [ 262.494950][T10094] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 262.502902][T10094] RDX: 0000000000000000 RSI: ffffffff815e9766 RDI: fffff52000fdef9a [ 262.510862][T10094] RBP: ffffc90007ef7d50 R08: ffff888054784380 R09: ffffed1015d26659 [ 262.518833][T10094] R10: ffffed1015d26658 R11: ffff8880ae9332c7 R12: 0000000000000003 [ 262.526802][T10094] R13: ffff8880a52cffd8 R14: ffff8880a52cff80 R15: ffffffff8a023640 [ 262.534775][T10094] ? vprintk_func+0x86/0x189 [ 262.539354][T10094] put_watch+0xa2/0xb0 [ 262.543406][T10094] watch_queue_release+0x34b/0xc40 [ 262.548513][T10094] __fput+0x2ff/0x890 [ 262.552480][T10094] ? __post_watch_notification+0x840/0x840 [ 262.558270][T10094] ____fput+0x16/0x20 [ 262.562236][T10094] task_work_run+0x145/0x1c0 [ 262.566815][T10094] exit_to_usermode_loop+0x316/0x380 [ 262.572089][T10094] do_syscall_64+0x676/0x790 [ 262.576699][T10094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.582580][T10094] RIP: 0033:0x4144b1 [ 262.586471][T10094] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 262.606075][T10094] RSP: 002b:00007ffcf6912fc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 262.614475][T10094] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004144b1 [ 262.622557][T10094] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 262.630532][T10094] RBP: 0000000000000001 R08: 0000000058570adf R09: 0000000058570ae3 [ 262.638606][T10094] R10: 00007ffcf69130a0 R11: 0000000000000293 R12: 000000000075bf20 [ 262.646575][T10094] R13: 0000000000040001 R14: 0000000000760d28 R15: 000000000075bf2c [ 262.656225][T10094] Kernel Offset: disabled [ 262.660698][T10094] Rebooting in 86400 seconds..