Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 32.054820] kauditd_printk_skb: 9 callbacks suppressed [ 32.054832] audit: type=1800 audit(1542101879.818:33): pid=5932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 32.083102] audit: type=1800 audit(1542101879.818:34): pid=5932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 55.305736] audit: type=1400 audit(1542101903.068:35): avc: denied { map } for pid=6113 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.121' (ECDSA) to the list of known hosts. 2018/11/13 09:38:29 fuzzer started [ 61.657025] audit: type=1400 audit(1542101909.418:36): avc: denied { map } for pid=6122 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/11/13 09:38:31 dialing manager at 10.128.0.26:46819 2018/11/13 09:38:39 syscalls: 1 2018/11/13 09:38:39 code coverage: enabled 2018/11/13 09:38:39 comparison tracing: enabled 2018/11/13 09:38:39 setuid sandbox: enabled 2018/11/13 09:38:39 namespace sandbox: enabled 2018/11/13 09:38:39 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/13 09:38:39 fault injection: enabled 2018/11/13 09:38:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/13 09:38:39 net packed injection: enabled 2018/11/13 09:38:39 net device setup: enabled 09:40:59 executing program 0: syz_emit_ethernet(0x419, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x3e3, 0x2c, 0x0, @dev, @local, {[], @dccp={{0x2c00, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, &(0x7f0000000040)) [ 211.743768] audit: type=1400 audit(1542102059.508:37): avc: denied { map } for pid=6135 comm="syz-executor0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=2180 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 211.822281] IPVS: ftp: loaded support on port[0] = 21 09:40:59 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) [ 212.063093] IPVS: ftp: loaded support on port[0] = 21 09:41:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x10, 0x3, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3f0000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x144}, {&(0x7f00000000c0)=""/85, 0x630}, {&(0x7f0000000fc0)=""/4096, 0x1064}, {&(0x7f0000000400)=""/120, 0x10a0}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x15}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f6, 0x6, &(0x7f0000003700)={0x77359400}) [ 212.447084] IPVS: ftp: loaded support on port[0] = 21 09:41:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000240)=0x1, 0xff9b) sendto$inet(r0, &(0x7f0000000100)="1b", 0x1, 0x220048047, &(0x7f00000001c0), 0x10) [ 212.941914] IPVS: ftp: loaded support on port[0] = 21 [ 213.140430] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.157960] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.165576] device bridge_slave_0 entered promiscuous mode 09:41:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000140)=""/20, 0x14}, 0x120) read$eventfd(r0, &(0x7f0000000000), 0x8) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0x7) [ 213.308257] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.324829] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.338849] device bridge_slave_1 entered promiscuous mode [ 213.452266] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.523293] IPVS: ftp: loaded support on port[0] = 21 [ 213.588078] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.637217] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.677514] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.684762] device bridge_slave_0 entered promiscuous mode 09:41:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 213.861750] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.870290] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.881865] device bridge_slave_1 entered promiscuous mode [ 214.019524] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.040725] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.061097] IPVS: ftp: loaded support on port[0] = 21 [ 214.141530] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.171797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.500561] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.515224] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.524270] device bridge_slave_0 entered promiscuous mode [ 214.580231] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.635313] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.650101] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.674978] device bridge_slave_1 entered promiscuous mode [ 214.689302] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.791691] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.858903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 214.866145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.898386] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.914265] team0: Port device team_slave_0 added [ 214.922602] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.932147] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.939884] device bridge_slave_0 entered promiscuous mode [ 214.971357] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.986999] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 215.002324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.050524] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.057995] team0: Port device team_slave_1 added [ 215.065396] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.078292] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.085759] device bridge_slave_1 entered promiscuous mode [ 215.135260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 215.158420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.178053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.258003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.287867] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.294853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.311750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.362659] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.376936] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.384805] team0: Port device team_slave_0 added [ 215.399934] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.408557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.416504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.443706] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 215.513392] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.533233] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.553163] team0: Port device team_slave_1 added [ 215.562429] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.585184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.601125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.672568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.729703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.755322] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.769478] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.776597] device bridge_slave_0 entered promiscuous mode [ 215.807981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 215.823470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.858707] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.868882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.907907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.938590] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.944989] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.983429] device bridge_slave_1 entered promiscuous mode [ 215.993581] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.014289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.024342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.040324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.113272] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.132580] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.140442] device bridge_slave_0 entered promiscuous mode [ 216.152460] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.163049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.207798] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.228176] team0: Port device team_slave_0 added [ 216.249991] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.257766] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.278445] device bridge_slave_1 entered promiscuous mode [ 216.288410] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.306634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 216.317187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.341946] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.358581] team0: Port device team_slave_1 added [ 216.372791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.487541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.522554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.615456] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.678352] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.706427] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 216.735047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.746859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.809876] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.838377] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.852990] team0: Port device team_slave_0 added [ 216.862047] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.878056] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.885151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.895071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.926162] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.993707] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 217.000927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.018677] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.034075] team0: Port device team_slave_1 added [ 217.049504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 217.056369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.100515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 217.119338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.145563] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.152045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.159236] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.165624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.180235] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 217.196007] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 217.219167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 217.232099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.248140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.271651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.299760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.306648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.328312] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.407293] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.445067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.459118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.548521] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 217.563795] team0: Port device team_slave_0 added [ 217.583405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 217.597104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.606983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.618138] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.624517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.631228] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.637621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.646844] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 217.691274] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 217.708866] team0: Port device team_slave_0 added [ 217.714977] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.739443] team0: Port device team_slave_1 added [ 217.744583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.755112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.806963] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.828295] team0: Port device team_slave_1 added [ 217.884191] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 217.897476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.907166] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.967739] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 217.976953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.994517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.023825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 218.054412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.068138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.093860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 218.107752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.122384] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.156519] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.167717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.185359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.237755] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.245047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.255311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.307866] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.317038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.348302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.400857] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.415974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.432357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.596868] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.603308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.610010] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.616380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.634204] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 218.750764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.021313] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.027784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.034411] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.040796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.067822] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.601369] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.607836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.614513] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.620944] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.666784] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.766403] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.772874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.779631] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.786008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.799132] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.807600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.816354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.837144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.307584] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.527819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.746395] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.931181] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.160946] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.167137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.176587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.365972] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.379998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.388238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.468080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.600097] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.824485] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.953536] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.238642] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.408199] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 224.414390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.423696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.447527] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.462329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.622807] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.856043] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.875350] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.953209] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.002023] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.022426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.032773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.289065] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.304796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.338265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.358519] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.367822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.374904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.536342] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.760615] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.803131] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.225234] audit: type=1400 audit(1542102073.988:38): avc: denied { associate } for pid=6136 comm="syz-executor0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 09:41:14 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0xfffffffffffffe7b) [ 226.546795] IPVS: ftp: loaded support on port[0] = 21 09:41:14 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0xfffffffffffffe7b) 09:41:14 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0xfffffffffffffe7b) 09:41:14 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0xfffffffffffffe7b) 09:41:14 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5437, &(0x7f0000002000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x63a}) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x0, 0x80, 0x0, 0x1ff, 0x4, 0x23}, 0xb) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[]}, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x6, 0x0, 0x3}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000640)={r1, @in6={{0xa, 0x4e23, 0x5, @loopback, 0x1ff}}, 0xf37a, 0x7, 0xffffffffffffffff, 0x5, 0x32}, &(0x7f0000000700)=0x98) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000002e80)=ANY=[], &(0x7f0000000e00)=""/213, 0x0, 0xd5, 0x1}, 0x20) ioctl$int_out(r2, 0x5460, &(0x7f0000000080)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', r4}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) socketpair$unix(0x1, 0x40001, 0x0, &(0x7f0000000f40)={0xffffffffffffffff}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(r5, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/40, 0x28}, {&(0x7f0000001080)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000f80)=""/240, 0xf0}], 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000180)) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x3, 0x22, &(0x7f0000000140)="ea2eb44616819ad28dffc329538b71e7a4329ed7b5af2e43e97799e63d0d476b1855"}) syz_open_pts(0xffffffffffffffff, 0x0) [ 227.064497] hrtimer: interrupt took 29044 ns [ 227.097887] audit: type=1400 audit(1542102074.838:39): avc: denied { prog_load } for pid=7595 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 227.114054] EXT4-fs (sda1): re-mounted. Opts: [ 227.281693] IPVS: ftp: loaded support on port[0] = 21 [ 227.287788] audit: type=1400 audit(1542102075.028:40): avc: denied { prog_run } for pid=7595 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 227.470723] EXT4-fs (sda1): re-mounted. Opts: 09:41:15 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5437, &(0x7f0000002000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x63a}) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x0, 0x80, 0x0, 0x1ff, 0x4, 0x23}, 0xb) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[]}, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x6, 0x0, 0x3}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000640)={r1, @in6={{0xa, 0x4e23, 0x5, @loopback, 0x1ff}}, 0xf37a, 0x7, 0xffffffffffffffff, 0x5, 0x32}, &(0x7f0000000700)=0x98) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000002e80)=ANY=[], &(0x7f0000000e00)=""/213, 0x0, 0xd5, 0x1}, 0x20) ioctl$int_out(r2, 0x5460, &(0x7f0000000080)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', r4}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) socketpair$unix(0x1, 0x40001, 0x0, &(0x7f0000000f40)={0xffffffffffffffff}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(r5, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/40, 0x28}, {&(0x7f0000001080)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000f80)=""/240, 0xf0}], 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000180)) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x3, 0x22, &(0x7f0000000140)="ea2eb44616819ad28dffc329538b71e7a4329ed7b5af2e43e97799e63d0d476b1855"}) syz_open_pts(0xffffffffffffffff, 0x0) 09:41:15 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) [ 227.733656] IPVS: ftp: loaded support on port[0] = 21 [ 227.921407] EXT4-fs (sda1): re-mounted. Opts: 09:41:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x10, 0x3, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3f0000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x144}, {&(0x7f00000000c0)=""/85, 0x630}, {&(0x7f0000000fc0)=""/4096, 0x1064}, {&(0x7f0000000400)=""/120, 0x10a0}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x15}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f6, 0x6, &(0x7f0000003700)={0x77359400}) 09:41:15 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5437, &(0x7f0000002000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x63a}) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x0, 0x80, 0x0, 0x1ff, 0x4, 0x23}, 0xb) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[]}, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x6, 0x0, 0x3}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000640)={r1, @in6={{0xa, 0x4e23, 0x5, @loopback, 0x1ff}}, 0xf37a, 0x7, 0xffffffffffffffff, 0x5, 0x32}, &(0x7f0000000700)=0x98) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000002e80)=ANY=[], &(0x7f0000000e00)=""/213, 0x0, 0xd5, 0x1}, 0x20) ioctl$int_out(r2, 0x5460, &(0x7f0000000080)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', r4}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) socketpair$unix(0x1, 0x40001, 0x0, &(0x7f0000000f40)={0xffffffffffffffff}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(r5, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/40, 0x28}, {&(0x7f0000001080)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000f80)=""/240, 0xf0}], 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000180)) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x3, 0x22, &(0x7f0000000140)="ea2eb44616819ad28dffc329538b71e7a4329ed7b5af2e43e97799e63d0d476b1855"}) syz_open_pts(0xffffffffffffffff, 0x0) [ 228.714611] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.730158] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.736886] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 09:41:16 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5437, &(0x7f0000002000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x63a}) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x0, 0x80, 0x0, 0x1ff, 0x4, 0x23}, 0xb) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[]}, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x6, 0x0, 0x3}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000640)={r1, @in6={{0xa, 0x4e23, 0x5, @loopback, 0x1ff}}, 0xf37a, 0x7, 0xffffffffffffffff, 0x5, 0x32}, &(0x7f0000000700)=0x98) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000002e80)=ANY=[], &(0x7f0000000e00)=""/213, 0x0, 0xd5, 0x1}, 0x20) ioctl$int_out(r2, 0x5460, &(0x7f0000000080)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', r4}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) socketpair$unix(0x1, 0x40001, 0x0, &(0x7f0000000f40)={0xffffffffffffffff}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(r5, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/40, 0x28}, {&(0x7f0000001080)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000f80)=""/240, 0xf0}], 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000180)) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x3, 0x22, &(0x7f0000000140)="ea2eb44616819ad28dffc329538b71e7a4329ed7b5af2e43e97799e63d0d476b1855"}) syz_open_pts(0xffffffffffffffff, 0x0) [ 228.796485] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.813429] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.830365] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.849474] audit: type=1400 audit(1542102076.618:41): avc: denied { create } for pid=7739 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 228.858752] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.909820] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.941183] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.961615] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.976646] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.983493] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 228.991133] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 229.003595] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 229.010711] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 229.026814] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 229.027749] EXT4-fs (sda1): re-mounted. Opts: [ 229.049243] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 229.064769] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 229.072152] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 229.079434] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 229.090281] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 229.114368] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.121277] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.128586] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.135428] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.162494] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.176784] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.186832] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.193762] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.201834] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.208945] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.215775] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.222822] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.229735] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.236536] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.243406] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.250292] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.257087] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 09:41:17 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000140)=""/20, 0x14}, 0x120) read$eventfd(r0, &(0x7f0000000000), 0x8) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0x7) 09:41:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x10, 0x3, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3f0000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x144}, {&(0x7f00000000c0)=""/85, 0x630}, {&(0x7f0000000fc0)=""/4096, 0x1064}, {&(0x7f0000000400)=""/120, 0x10a0}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x15}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f6, 0x6, &(0x7f0000003700)={0x77359400}) 09:41:17 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5437, &(0x7f0000002000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x63a}) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x0, 0x80, 0x0, 0x1ff, 0x4, 0x23}, 0xb) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[]}, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x6, 0x0, 0x3}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000640)={r1, @in6={{0xa, 0x4e23, 0x5, @loopback, 0x1ff}}, 0xf37a, 0x7, 0xffffffffffffffff, 0x5, 0x32}, &(0x7f0000000700)=0x98) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000002e80)=ANY=[], &(0x7f0000000e00)=""/213, 0x0, 0xd5, 0x1}, 0x20) ioctl$int_out(r2, 0x5460, &(0x7f0000000080)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', r4}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) socketpair$unix(0x1, 0x40001, 0x0, &(0x7f0000000f40)={0xffffffffffffffff}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(r5, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/40, 0x28}, {&(0x7f0000001080)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000f80)=""/240, 0xf0}], 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000180)) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x3, 0x22, &(0x7f0000000140)="ea2eb44616819ad28dffc329538b71e7a4329ed7b5af2e43e97799e63d0d476b1855"}) syz_open_pts(0xffffffffffffffff, 0x0) 09:41:17 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) 09:41:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 229.263933] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.270821] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.277686] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 229.285591] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 [ 229.342595] IPVS: ftp: loaded support on port[0] = 21 09:41:17 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5437, &(0x7f0000002000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x63a}) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x0, 0x80, 0x0, 0x1ff, 0x4, 0x23}, 0xb) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[]}, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x6, 0x0, 0x3}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000640)={r1, @in6={{0xa, 0x4e23, 0x5, @loopback, 0x1ff}}, 0xf37a, 0x7, 0xffffffffffffffff, 0x5, 0x32}, &(0x7f0000000700)=0x98) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000002e80)=ANY=[], &(0x7f0000000e00)=""/213, 0x0, 0xd5, 0x1}, 0x20) ioctl$int_out(r2, 0x5460, &(0x7f0000000080)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', r4}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) socketpair$unix(0x1, 0x40001, 0x0, &(0x7f0000000f40)={0xffffffffffffffff}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(r5, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/40, 0x28}, {&(0x7f0000001080)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000f80)=""/240, 0xf0}], 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000180)) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x3, 0x22, &(0x7f0000000140)="ea2eb44616819ad28dffc329538b71e7a4329ed7b5af2e43e97799e63d0d476b1855"}) syz_open_pts(0xffffffffffffffff, 0x0) [ 229.395565] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.413930] audit: type=1400 audit(1542102077.178:42): avc: denied { write } for pid=7761 comm="syz-executor5" path="socket:[26849]" dev="sockfs" ino=26849 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 09:41:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x10, 0x3, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3f0000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x144}, {&(0x7f00000000c0)=""/85, 0x630}, {&(0x7f0000000fc0)=""/4096, 0x1064}, {&(0x7f0000000400)=""/120, 0x10a0}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x15}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f6, 0x6, &(0x7f0000003700)={0x77359400}) [ 229.424896] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.460158] EXT4-fs (sda1): re-mounted. Opts: [ 229.570236] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.626281] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.669346] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.705372] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 09:41:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000180)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x109002, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 229.766398] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.774019] EXT4-fs (sda1): re-mounted. Opts: [ 229.802573] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.829915] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.895646] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.925962] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.945649] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.966733] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 229.987443] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 230.009160] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 230.030655] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 230.052492] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 230.073996] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 230.105111] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 230.133632] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 230.191395] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 09:41:18 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000140)=""/20, 0x14}, 0x120) read$eventfd(r0, &(0x7f0000000000), 0x8) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0x7) 09:41:18 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x10) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) symlinkat(&(0x7f00000001c0)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file1/file0\x00') setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x370, 0x170, 0x0, 0x0, 0x170, 0x0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4, &(0x7f0000000300), {[{{@ip={@broadcast, @loopback, 0xffffffff, 0x0, 'sit0\x00', 'bpq0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local, 0x5, 0x1, [0x32, 0x1c, 0x3d, 0x31, 0x0, 0x0, 0x37, 0x2a, 0x3e, 0x39, 0x5, 0x1, 0x29, 0x17], 0x0, 0x4, 0x5}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x100000000, 0x2], 0x4, 0x2550}, {0x8, [0x9, 0x80, 0x0, 0x7, 0x8, 0x7f], 0x8}}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xf, 0xb2f}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) execve(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000001500), &(0x7f0000001480)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x10}) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000340), 0x1fe}], 0x1, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="03"], 0x1, 0x800) msgrcv(0x0, &(0x7f0000000240)={0x0, ""/4}, 0xc, 0x0, 0x2000) [ 230.318690] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.325425] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.366292] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.382402] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.397506] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.412453] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.430362] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.447512] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.461356] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.477291] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.492212] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.507304] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 09:41:18 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5437, &(0x7f0000002000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x63a}) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x0, 0x80, 0x0, 0x1ff, 0x4, 0x23}, 0xb) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[]}, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x6, 0x0, 0x3}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000640)={r1, @in6={{0xa, 0x4e23, 0x5, @loopback, 0x1ff}}, 0xf37a, 0x7, 0xffffffffffffffff, 0x5, 0x32}, &(0x7f0000000700)=0x98) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000002e80)=ANY=[], &(0x7f0000000e00)=""/213, 0x0, 0xd5, 0x1}, 0x20) ioctl$int_out(r2, 0x5460, &(0x7f0000000080)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', r4}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) socketpair$unix(0x1, 0x40001, 0x0, &(0x7f0000000f40)={0xffffffffffffffff}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(r5, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/40, 0x28}, {&(0x7f0000001080)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000f80)=""/240, 0xf0}], 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000180)) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x3, 0x22, &(0x7f0000000140)="ea2eb44616819ad28dffc329538b71e7a4329ed7b5af2e43e97799e63d0d476b1855"}) syz_open_pts(0xffffffffffffffff, 0x0) 09:41:18 executing program 2: io_setup(0x800, &(0x7f0000000040)=0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) io_submit(r0, 0x1, &(0x7f0000000400)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000080), 0x171}]) 09:41:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 230.525608] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.540471] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.555271] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.570206] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.591006] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.618085] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.632858] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.663270] EXT4-fs (sda1): re-mounted. Opts: [ 230.694852] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 230.738501] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz0] on syz0 09:41:18 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) 09:41:18 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000140)=""/20, 0x14}, 0x120) read$eventfd(r0, &(0x7f0000000000), 0x8) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0x7) 09:41:18 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x80011, r0, 0x0) futex(&(0x7f0000001ac0), 0x3, 0x0, &(0x7f0000001c00), &(0x7f0000001c40), 0x0) [ 230.963976] IPVS: ftp: loaded support on port[0] = 21 [ 230.964068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 230.981021] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.004934] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.030852] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 09:41:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000006a40)=[{{&(0x7f0000004dc0)=@alg, 0x80, &(0x7f0000005180), 0x0, &(0x7f00000002c0)=""/243, 0xf3}}], 0x1, 0x0, &(0x7f0000006b00)={0x0, 0x989680}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000007780)={&(0x7f00000000c0), 0xc, &(0x7f0000007740)={&(0x7f0000000300)=ANY=[]}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000007000)={&(0x7f0000000080)={0x18, 0x2f, 0x80010b, 0x0, 0x0, {0x2}, [@generic='L']}, 0x18}}, 0x0) [ 231.057053] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.093747] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 09:41:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x1, 0x0, 0xffffffffffffc8ad}) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000480)=0x4) rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r4}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) [ 231.137831] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.163327] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.181919] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.203072] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.223908] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.243676] audit: type=1400 audit(1542102079.008:43): avc: denied { create } for pid=7829 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 231.271139] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.293080] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.300282] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.307092] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.314310] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.321550] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.328757] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.335582] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.342850] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 231.360013] audit: type=1400 audit(1542102079.008:44): avc: denied { read } for pid=7829 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 231.391363] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz0] on syz0 [ 231.462182] audit: type=1400 audit(1542102079.058:45): avc: denied { write } for pid=7829 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:41:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 09:41:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in, 0x0, 0x0, 0x0, 0xc4ff}}, &(0x7f0000000440)=0xb0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x7b}) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 09:41:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000006a40)=[{{&(0x7f0000004dc0)=@alg, 0x80, &(0x7f0000005180), 0x0, &(0x7f00000002c0)=""/243, 0xf3}}], 0x1, 0x0, &(0x7f0000006b00)={0x0, 0x989680}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000007780)={&(0x7f00000000c0), 0xc, &(0x7f0000007740)={&(0x7f0000000300)=ANY=[]}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000007000)={&(0x7f0000000080)={0x18, 0x2f, 0x80010b, 0x0, 0x0, {0x2}, [@generic='L']}, 0x18}}, 0x0) [ 231.579258] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 231.928290] ntfs: (device loop0): parse_options(): Unrecognized mount option ./file1. [ 231.956919] overlayfs: filesystem on './file0' not supported as upperdir 09:41:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in, 0x0, 0x0, 0x0, 0xc4ff}}, &(0x7f0000000440)=0xb0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x7b}) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 09:41:20 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x1, 0x0, 0xffffffffffffc8ad}) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000480)=0x4) rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r4}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) 09:41:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000006a40)=[{{&(0x7f0000004dc0)=@alg, 0x80, &(0x7f0000005180), 0x0, &(0x7f00000002c0)=""/243, 0xf3}}], 0x1, 0x0, &(0x7f0000006b00)={0x0, 0x989680}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000007780)={&(0x7f00000000c0), 0xc, &(0x7f0000007740)={&(0x7f0000000300)=ANY=[]}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000007000)={&(0x7f0000000080)={0x18, 0x2f, 0x80010b, 0x0, 0x0, {0x2}, [@generic='L']}, 0x18}}, 0x0) 09:41:20 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x10) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) symlinkat(&(0x7f00000001c0)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file1/file0\x00') setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x370, 0x170, 0x0, 0x0, 0x170, 0x0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4, &(0x7f0000000300), {[{{@ip={@broadcast, @loopback, 0xffffffff, 0x0, 'sit0\x00', 'bpq0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local, 0x5, 0x1, [0x32, 0x1c, 0x3d, 0x31, 0x0, 0x0, 0x37, 0x2a, 0x3e, 0x39, 0x5, 0x1, 0x29, 0x17], 0x0, 0x4, 0x5}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x100000000, 0x2], 0x4, 0x2550}, {0x8, [0x9, 0x80, 0x0, 0x7, 0x8, 0x7f], 0x8}}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xf, 0xb2f}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) execve(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000001500), &(0x7f0000001480)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x10}) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000340), 0x1fe}], 0x1, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="03"], 0x1, 0x800) msgrcv(0x0, &(0x7f0000000240)={0x0, ""/4}, 0xc, 0x0, 0x2000) [ 232.385719] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 09:41:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in, 0x0, 0x0, 0x0, 0xc4ff}}, &(0x7f0000000440)=0xb0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x7b}) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 09:41:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000006a40)=[{{&(0x7f0000004dc0)=@alg, 0x80, &(0x7f0000005180), 0x0, &(0x7f00000002c0)=""/243, 0xf3}}], 0x1, 0x0, &(0x7f0000006b00)={0x0, 0x989680}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000007780)={&(0x7f00000000c0), 0xc, &(0x7f0000007740)={&(0x7f0000000300)=ANY=[]}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000007000)={&(0x7f0000000080)={0x18, 0x2f, 0x80010b, 0x0, 0x0, {0x2}, [@generic='L']}, 0x18}}, 0x0) 09:41:20 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x1, 0x0, 0xffffffffffffc8ad}) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000480)=0x4) rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r4}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) 09:41:20 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x10) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) symlinkat(&(0x7f00000001c0)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file1/file0\x00') setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x370, 0x170, 0x0, 0x0, 0x170, 0x0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4, &(0x7f0000000300), {[{{@ip={@broadcast, @loopback, 0xffffffff, 0x0, 'sit0\x00', 'bpq0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local, 0x5, 0x1, [0x32, 0x1c, 0x3d, 0x31, 0x0, 0x0, 0x37, 0x2a, 0x3e, 0x39, 0x5, 0x1, 0x29, 0x17], 0x0, 0x4, 0x5}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x100000000, 0x2], 0x4, 0x2550}, {0x8, [0x9, 0x80, 0x0, 0x7, 0x8, 0x7f], 0x8}}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xf, 0xb2f}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) execve(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000001500), &(0x7f0000001480)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x10}) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000340), 0x1fe}], 0x1, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="03"], 0x1, 0x800) msgrcv(0x0, &(0x7f0000000240)={0x0, ""/4}, 0xc, 0x0, 0x2000) 09:41:20 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x1, 0x0, 0xffffffffffffc8ad}) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000480)=0x4) rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r4}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) 09:41:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x5, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x19}]}, &(0x7f00000000c0)='GPL\x00', 0xe6, 0xfb, &(0x7f0000000300)=""/251}, 0x48) 09:41:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rfkill\x00', 0x80, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f00000002c0)=""/114) r1 = socket$inet6(0xa, 0x0, 0x10000000) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r4 = dup2(r2, r1) flock(r2, 0x5) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000180)) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000740)=0x1, 0xfffffcfc) r5 = socket$inet(0x2, 0x1, 0x1000000000000) syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x14001, 0x2000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) fcntl$setpipe(r5, 0x407, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f0000000540)=0xc) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a80)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$nl_xfrm(r8, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0xd101}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r8, 0x891b, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x4e21, @remote}}) socket$inet6(0xa, 0x800, 0xfbd) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000001500)={&(0x7f0000000140)={0x10, 0x3, 0x0, 0x1280082}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}}, 0x80) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000700)=r7) 09:41:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127", 0xf8) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)='c', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r1, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) 09:41:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in, 0x0, 0x0, 0x0, 0xc4ff}}, &(0x7f0000000440)=0xb0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x7b}) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) [ 232.963537] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 09:41:20 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x1, 0x0, 0xffffffffffffc8ad}) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000480)=0x4) rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r4}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) 09:41:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127", 0xf8) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)='c', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r1, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) 09:41:20 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x1, 0x0, 0xffffffffffffc8ad}) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000480)=0x4) rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r4}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) 09:41:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127", 0xf8) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)='c', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r1, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) 09:41:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) 09:41:21 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x10) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) symlinkat(&(0x7f00000001c0)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file1/file0\x00') setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x370, 0x170, 0x0, 0x0, 0x170, 0x0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4, &(0x7f0000000300), {[{{@ip={@broadcast, @loopback, 0xffffffff, 0x0, 'sit0\x00', 'bpq0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local, 0x5, 0x1, [0x32, 0x1c, 0x3d, 0x31, 0x0, 0x0, 0x37, 0x2a, 0x3e, 0x39, 0x5, 0x1, 0x29, 0x17], 0x0, 0x4, 0x5}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x100000000, 0x2], 0x4, 0x2550}, {0x8, [0x9, 0x80, 0x0, 0x7, 0x8, 0x7f], 0x8}}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xf, 0xb2f}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) execve(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000001500), &(0x7f0000001480)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x10}) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000340), 0x1fe}], 0x1, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="03"], 0x1, 0x800) msgrcv(0x0, &(0x7f0000000240)={0x0, ""/4}, 0xc, 0x0, 0x2000) 09:41:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127", 0xf8) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)='c', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r1, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) 09:41:21 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000000080)}) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000680)={0x8, 0x0, &(0x7f0000000900)=[@increfs], 0x0, 0x0, &(0x7f00000006c0)}) 09:41:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x1, 0x0, 0xffffffffffffc8ad}) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000480)=0x4) rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r4}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) 09:41:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rfkill\x00', 0x80, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f00000002c0)=""/114) r1 = socket$inet6(0xa, 0x0, 0x10000000) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r4 = dup2(r2, r1) flock(r2, 0x5) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000180)) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000740)=0x1, 0xfffffcfc) r5 = socket$inet(0x2, 0x1, 0x1000000000000) syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x14001, 0x2000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) fcntl$setpipe(r5, 0x407, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f0000000540)=0xc) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a80)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$nl_xfrm(r8, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0xd101}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r8, 0x891b, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x4e21, @remote}}) socket$inet6(0xa, 0x800, 0xfbd) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000001500)={&(0x7f0000000140)={0x10, 0x3, 0x0, 0x1280082}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}}, 0x80) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000700)=r7) [ 233.573321] audit: type=1400 audit(1542102081.338:46): avc: denied { set_context_mgr } for pid=7963 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 233.591997] overlayfs: failed to resolve './file1': -2 09:41:21 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000000c0)={0x0, 0x54485746, 0x0, @stepwise}) [ 233.647172] binder: 7963:7964 tried to acquire reference to desc 0, got 1 instead 09:41:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) r0 = gettid() prctl$setptracer(0x59616d61, r0) 09:41:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x57}}, &(0x7f0000000140)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) 09:41:21 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x8100, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'bond0\x00', 'team0\x00', 'bond0\x00', 'veth1_to_bridge\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}]}, 0x278) 09:41:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x2) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000140)=0x7, 0x4) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000500)={0x20, 0x0, 0x2, 0x100000000, 0x2, 0x3}) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x1) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/140, 0x8c, 0x2021, &(0x7f0000000680)={0x2, 0x800, @rand_addr=0x1ff}, 0xffffffffffffff15) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) getpgid(0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4}) connect$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0xfffffffffffffc32, {0x8001, 0x0, 0x1f, 0x80000000, 0x80, 0x9}, 0x42f5, 0xa019}, 0xe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x5, 0x200000000, 'queue1\x00', 0x7fffffff}) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000340)={0x19, 0x2, 0x9}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r1, &(0x7f0000005200)=""/4096) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f00000011c0)={0xffffffffffffffff, 0x57}) 09:41:21 executing program 0: socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004740)=[{{&(0x7f0000000940)=@sco, 0x80, &(0x7f0000001b80)=[{&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/26, 0x1a}], 0x2, &(0x7f0000001c00)=""/183, 0xb7, 0x1}}, {{&(0x7f0000002000)=@can, 0x80, &(0x7f00000021c0)=[{&(0x7f0000003600)=""/4096, 0x1000}], 0x1, &(0x7f0000002440)=""/23, 0x17, 0x20}}], 0x2, 0x0, &(0x7f0000004880)={0x77359400}) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, @link_local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'bpq0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002480), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0xe4, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 09:41:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) r0 = gettid() prctl$setptracer(0x59616d61, r0) 09:41:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rfkill\x00', 0x80, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f00000002c0)=""/114) r1 = socket$inet6(0xa, 0x0, 0x10000000) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r4 = dup2(r2, r1) flock(r2, 0x5) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000180)) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000740)=0x1, 0xfffffcfc) r5 = socket$inet(0x2, 0x1, 0x1000000000000) syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x14001, 0x2000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) fcntl$setpipe(r5, 0x407, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f0000000540)=0xc) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a80)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$nl_xfrm(r8, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0xd101}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r8, 0x891b, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x4e21, @remote}}) socket$inet6(0xa, 0x800, 0xfbd) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000001500)={&(0x7f0000000140)={0x10, 0x3, 0x0, 0x1280082}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}}, 0x80) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000700)=r7) [ 233.970277] cannot load conntrack support for proto=7 09:41:21 executing program 4: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002480), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0xe4, 0x4) 09:41:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'none'}}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 09:41:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) r0 = gettid() prctl$setptracer(0x59616d61, r0) 09:41:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13a9e058a0f9c773d668fe6afd6ae2470a417760376ff88272052872baf485c50023934860653afae3d24e721316", 0xc0}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0xfffffffffffffffa, 0x0, 0x0, 0x7fffffff}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000280)={0x58}) [ 234.203911] hfs: unable to change iocharset [ 234.227560] hfs: unable to parse mount options 09:41:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x2) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000140)=0x7, 0x4) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000500)={0x20, 0x0, 0x2, 0x100000000, 0x2, 0x3}) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x1) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/140, 0x8c, 0x2021, &(0x7f0000000680)={0x2, 0x800, @rand_addr=0x1ff}, 0xffffffffffffff15) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) getpgid(0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4}) connect$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0xfffffffffffffc32, {0x8001, 0x0, 0x1f, 0x80000000, 0x80, 0x9}, 0x42f5, 0xa019}, 0xe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x5, 0x200000000, 'queue1\x00', 0x7fffffff}) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000340)={0x19, 0x2, 0x9}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r1, &(0x7f0000005200)=""/4096) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f00000011c0)={0xffffffffffffffff, 0x57}) 09:41:22 executing program 0: socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004740)=[{{&(0x7f0000000940)=@sco, 0x80, &(0x7f0000001b80)=[{&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/26, 0x1a}], 0x2, &(0x7f0000001c00)=""/183, 0xb7, 0x1}}, {{&(0x7f0000002000)=@can, 0x80, &(0x7f00000021c0)=[{&(0x7f0000003600)=""/4096, 0x1000}], 0x1, &(0x7f0000002440)=""/23, 0x17, 0x20}}], 0x2, 0x0, &(0x7f0000004880)={0x77359400}) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, @link_local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'bpq0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002480), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0xe4, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 09:41:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) r0 = gettid() prctl$setptracer(0x59616d61, r0) 09:41:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x2) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000140)=0x7, 0x4) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000500)={0x20, 0x0, 0x2, 0x100000000, 0x2, 0x3}) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x1) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/140, 0x8c, 0x2021, &(0x7f0000000680)={0x2, 0x800, @rand_addr=0x1ff}, 0xffffffffffffff15) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) getpgid(0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4}) connect$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0xfffffffffffffc32, {0x8001, 0x0, 0x1f, 0x80000000, 0x80, 0x9}, 0x42f5, 0xa019}, 0xe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x5, 0x200000000, 'queue1\x00', 0x7fffffff}) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000340)={0x19, 0x2, 0x9}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r1, &(0x7f0000005200)=""/4096) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f00000011c0)={0xffffffffffffffff, 0x57}) 09:41:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13a9e058a0f9c773d668fe6afd6ae2470a417760376ff88272052872baf485c50023934860653afae3d24e721316", 0xc0}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0xfffffffffffffffa, 0x0, 0x0, 0x7fffffff}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000280)={0x58}) 09:41:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rfkill\x00', 0x80, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f00000002c0)=""/114) r1 = socket$inet6(0xa, 0x0, 0x10000000) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r4 = dup2(r2, r1) flock(r2, 0x5) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000180)) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000740)=0x1, 0xfffffcfc) r5 = socket$inet(0x2, 0x1, 0x1000000000000) syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x14001, 0x2000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) fcntl$setpipe(r5, 0x407, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f0000000540)=0xc) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a80)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$nl_xfrm(r8, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0xd101}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r8, 0x891b, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x4e21, @remote}}) socket$inet6(0xa, 0x800, 0xfbd) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000001500)={&(0x7f0000000140)={0x10, 0x3, 0x0, 0x1280082}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}}, 0x80) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000700)=r7) 09:41:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13a9e058a0f9c773d668fe6afd6ae2470a417760376ff88272052872baf485c50023934860653afae3d24e721316", 0xc0}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0xfffffffffffffffa, 0x0, 0x0, 0x7fffffff}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000280)={0x58}) 09:41:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x2) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000140)=0x7, 0x4) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000500)={0x20, 0x0, 0x2, 0x100000000, 0x2, 0x3}) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x1) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/140, 0x8c, 0x2021, &(0x7f0000000680)={0x2, 0x800, @rand_addr=0x1ff}, 0xffffffffffffff15) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) getpgid(0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4}) connect$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0xfffffffffffffc32, {0x8001, 0x0, 0x1f, 0x80000000, 0x80, 0x9}, 0x42f5, 0xa019}, 0xe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x5, 0x200000000, 'queue1\x00', 0x7fffffff}) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000340)={0x19, 0x2, 0x9}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r1, &(0x7f0000005200)=""/4096) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f00000011c0)={0xffffffffffffffff, 0x57}) 09:41:22 executing program 0: socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004740)=[{{&(0x7f0000000940)=@sco, 0x80, &(0x7f0000001b80)=[{&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/26, 0x1a}], 0x2, &(0x7f0000001c00)=""/183, 0xb7, 0x1}}, {{&(0x7f0000002000)=@can, 0x80, &(0x7f00000021c0)=[{&(0x7f0000003600)=""/4096, 0x1000}], 0x1, &(0x7f0000002440)=""/23, 0x17, 0x20}}], 0x2, 0x0, &(0x7f0000004880)={0x77359400}) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, @link_local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'bpq0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002480), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0xe4, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 09:41:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13a9e058a0f9c773d668fe6afd6ae2470a417760376ff88272052872baf485c50023934860653afae3d24e721316", 0xc0}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0xfffffffffffffffa, 0x0, 0x0, 0x7fffffff}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000280)={0x58}) 09:41:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13a9e058a0f9c773d668fe6afd6ae2470a417760376ff88272052872baf485c50023934860653afae3d24e721316", 0xc0}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0xfffffffffffffffa, 0x0, 0x0, 0x7fffffff}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000280)={0x58}) 09:41:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x2) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000140)=0x7, 0x4) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000500)={0x20, 0x0, 0x2, 0x100000000, 0x2, 0x3}) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x1) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/140, 0x8c, 0x2021, &(0x7f0000000680)={0x2, 0x800, @rand_addr=0x1ff}, 0xffffffffffffff15) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) getpgid(0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4}) connect$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0xfffffffffffffc32, {0x8001, 0x0, 0x1f, 0x80000000, 0x80, 0x9}, 0x42f5, 0xa019}, 0xe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x5, 0x200000000, 'queue1\x00', 0x7fffffff}) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000340)={0x19, 0x2, 0x9}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r1, &(0x7f0000005200)=""/4096) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f00000011c0)={0xffffffffffffffff, 0x57}) 09:41:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/91, 0x5b) ioctl$VIDIOC_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xf69, 0x0, 0x0, 0x0, 0x0, 0xc}}) 09:41:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x2) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000140)=0x7, 0x4) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000500)={0x20, 0x0, 0x2, 0x100000000, 0x2, 0x3}) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x1) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/140, 0x8c, 0x2021, &(0x7f0000000680)={0x2, 0x800, @rand_addr=0x1ff}, 0xffffffffffffff15) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) getpgid(0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4}) connect$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0xfffffffffffffc32, {0x8001, 0x0, 0x1f, 0x80000000, 0x80, 0x9}, 0x42f5, 0xa019}, 0xe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x5, 0x200000000, 'queue1\x00', 0x7fffffff}) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000340)={0x19, 0x2, 0x9}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r1, &(0x7f0000005200)=""/4096) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f00000011c0)={0xffffffffffffffff, 0x57}) 09:41:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13a9e058a0f9c773d668fe6afd6ae2470a417760376ff88272052872baf485c50023934860653afae3d24e721316", 0xc0}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0xfffffffffffffffa, 0x0, 0x0, 0x7fffffff}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000280)={0x58}) 09:41:22 executing program 0: socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004740)=[{{&(0x7f0000000940)=@sco, 0x80, &(0x7f0000001b80)=[{&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/26, 0x1a}], 0x2, &(0x7f0000001c00)=""/183, 0xb7, 0x1}}, {{&(0x7f0000002000)=@can, 0x80, &(0x7f00000021c0)=[{&(0x7f0000003600)=""/4096, 0x1000}], 0x1, &(0x7f0000002440)=""/23, 0x17, 0x20}}], 0x2, 0x0, &(0x7f0000004880)={0x77359400}) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, @link_local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'bpq0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002480), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0xe4, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 09:41:22 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240), {0x40, 0xdce00, 0x35315258, 0x0, 0x1000000}}) 09:41:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13a9e058a0f9c773d668fe6afd6ae2470a417760376ff88272052872baf485c50023934860653afae3d24e721316", 0xc0}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0xfffffffffffffffa, 0x0, 0x0, 0x7fffffff}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000280)={0x58}) 09:41:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr}, {}, 0x8, {0x2, 0x0, @broadcast}, 'veth0_to_bond\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{}, {}, 0x8, {0x2, 0x0, @loopback}, 'veth0_to_bond\x00'}) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xffffffffffffffde, 0x8200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffff9c}) setsockopt$inet_dccp_int(r1, 0x21, 0x0, &(0x7f00000001c0), 0x4) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000180)={r2}) r3 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r3, 0x0) 09:41:23 executing program 4: r0 = add_key(&(0x7f0000000340)='big_key\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000540)='\x00', 0x1, 0xfffffffffffffffe) keyctl$clear(0x7, r0) 09:41:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00', 0x0}) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f00000027c0)) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0xf0ffffff}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xffffff9e, 0xf0ffffff}, [@NDA_LLADDR={0xa, 0x2, @empty=[0xf0ffffff]}]}, 0x28}}, 0x0) 09:41:23 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f0000000040)={0x7}, 0x7) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 235.260408] audit: type=1400 audit(1542102083.028:47): avc: denied { map } for pid=8097 comm="syz-executor3" path=2F6D656D66643A23656D31232B202864656C6574656429 dev="tmpfs" ino=27858 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 09:41:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) r1 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x2) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000140)=0x7, 0x4) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000500)={0x20, 0x0, 0x2, 0x100000000, 0x2, 0x3}) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x1) r2 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/140, 0x8c, 0x2021, &(0x7f0000000680)={0x2, 0x800, @rand_addr=0x1ff}, 0xffffffffffffff15) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) getpgid(0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4}) connect$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0xfffffffffffffc32, {0x8001, 0x0, 0x1f, 0x80000000, 0x80, 0x9}, 0x42f5, 0xa019}, 0xe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x5, 0x200000000, 'queue1\x00', 0x7fffffff}) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000340)={0x19, 0x2, 0x9}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r1, &(0x7f0000005200)=""/4096) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f00000011c0)={0xffffffffffffffff, 0x57}) 09:41:23 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x3, r1, 0x0, 0x20000000) 09:41:23 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f857150") r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x34, 0x1) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f0000000440)={&(0x7f0000000140)={0x1458e6fda6d06f5c, 0x0, 0x0, 0x70bd2b, 0x25dfdbfc}, 0x24a}, 0x1, 0x0, 0x0, 0x10}, 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f00000002c0)=ANY=[]) personality(0xc) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) prctl$seccomp(0x16, 0x3, &(0x7f00000002c0)={0x1, &(0x7f0000000240)=[{0x5, 0x7, 0x7fff, 0xfffffffffffffe00}]}) fchdir(r1) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r2 = open(&(0x7f0000000480)='./file0\x00', 0x42042, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x4000, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x80004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000200)=0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) write(r2, &(0x7f0000000840)="fc015002a2a55e34dab67b7517766f3188a613b48bef6d2a2999d8da9474917335f8e2f9da2a75722ec004a5e6e244499c012b7a80b129b96d8fa518fef1eecc7743f4d9e96018d4ded15ff21514c13fa444e6f7fee6c2516c91723bf3646a5803887e502f26fc7cfd736ef2c59317e90d8a27ddc1a9d9510b306ede2aaafb95abbc44f0033f7e63c88beb46c697412d6083e6462ed5e06d6bab1352ff887771a302ad4d2c7322bf17eb05ec97", 0xad) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) sendfile(r2, r2, &(0x7f00000000c0)=0x2, 0x8080ffffff10) ioctl$int_out(r0, 0x2000000040045730, &(0x7f0000000000)) 09:41:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 09:41:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000003c0)={'bcsh0\x00'}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x4, 0x9, 0x20, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000340)) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000300)=@add_del={0x2, &(0x7f00000002c0)='irlan0\x00', 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x6, 0x8, &(0x7f0000000600)) 09:41:23 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x11, &(0x7f00000000c0), 0x69b) 09:41:23 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x3, r1, 0x0, 0x20000000) [ 235.624195] audit: type=1800 audit(1542102083.388:48): pid=8135 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16521 res=0 09:41:23 executing program 4: creat(&(0x7f0000000400)='./file0\x00', 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="3a3a2c2e3a6e756c59caa22f"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)="50f073656c696e75786367726f757000") 09:41:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) 09:41:23 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x3, r1, 0x0, 0x20000000) [ 235.935439] ceph: device name is missing path (no : separator in ::,.:nulYÊ¢/) 09:41:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)='\n', 0x1) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="c3", 0x1}], 0x1, &(0x7f0000000080)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)=""/229, 0x200004a5}], 0x1, &(0x7f00000044c0)=""/19, 0x13}}], 0x3, 0x0, &(0x7f0000007380)={0x0, 0x1c9c380}) 09:41:23 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x3, r1, 0x0, 0x20000000) 09:41:23 executing program 2: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x200) 09:41:24 executing program 4: clone(0x200000041fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getsig(0x2, r0, 0xfffffffffffffffd, &(0x7f0000001380)) [ 236.380049] kauditd_printk_skb: 2 callbacks suppressed [ 236.380076] audit: type=1804 audit(1542102084.148:51): pid=8167 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir117194192/syzkaller.m6GYRJ/16/file0/file0" dev="sda1" ino=16577 res=1 [ 236.450738] audit: type=1804 audit(1542102084.208:52): pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir117194192/syzkaller.m6GYRJ/16/file0/file0" dev="sda1" ino=16577 res=1 09:41:24 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f857150") r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x34, 0x1) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f0000000440)={&(0x7f0000000140)={0x1458e6fda6d06f5c, 0x0, 0x0, 0x70bd2b, 0x25dfdbfc}, 0x24a}, 0x1, 0x0, 0x0, 0x10}, 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f00000002c0)=ANY=[]) personality(0xc) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) prctl$seccomp(0x16, 0x3, &(0x7f00000002c0)={0x1, &(0x7f0000000240)=[{0x5, 0x7, 0x7fff, 0xfffffffffffffe00}]}) fchdir(r1) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r2 = open(&(0x7f0000000480)='./file0\x00', 0x42042, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x4000, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x80004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000200)=0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) write(r2, &(0x7f0000000840)="fc015002a2a55e34dab67b7517766f3188a613b48bef6d2a2999d8da9474917335f8e2f9da2a75722ec004a5e6e244499c012b7a80b129b96d8fa518fef1eecc7743f4d9e96018d4ded15ff21514c13fa444e6f7fee6c2516c91723bf3646a5803887e502f26fc7cfd736ef2c59317e90d8a27ddc1a9d9510b306ede2aaafb95abbc44f0033f7e63c88beb46c697412d6083e6462ed5e06d6bab1352ff887771a302ad4d2c7322bf17eb05ec97", 0xad) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) sendfile(r2, r2, &(0x7f00000000c0)=0x2, 0x8080ffffff10) ioctl$int_out(r0, 0x2000000040045730, &(0x7f0000000000)) 09:41:24 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x1014001, &(0x7f00000001c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = dup2(r0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440), r2, r3}}, 0x18) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r5, 0x2275, &(0x7f00000000c0)=0x10d060000) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x1, {{0xc, 0x0, 0x1}, 0x2}}, 0x18) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0xf30c000000000000, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfcf3) nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000200)={0x2, 0x2, 0x7, {r7, r8+30000000}}) [ 236.611356] audit: type=1804 audit(1542102084.378:53): pid=8135 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir193773234/syzkaller.thNnwu/18/file0" dev="sda1" ino=16521 res=1 [ 236.639152] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 236.673182] audit: type=1800 audit(1542102084.378:54): pid=8135 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16521 res=0 [ 236.772837] audit: type=1400 audit(1542102084.428:55): avc: denied { map } for pid=8179 comm="syz-executor2" path="/dev/sg0" dev="devtmpfs" ino=15175 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 09:41:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000003c0)={'bcsh0\x00'}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x4, 0x9, 0x20, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000340)) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000300)=@add_del={0x2, &(0x7f00000002c0)='irlan0\x00', 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x6, 0x8, &(0x7f0000000600)) 09:41:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 09:41:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="720af8ff40000000bfa100000000000007010000f8ffffffb702000000000000bf120000000000008500000004000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00'}, 0x48) [ 237.118224] audit: type=1800 audit(1542102084.878:56): pid=8200 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16586 res=0 09:41:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) [ 237.187413] audit: type=1804 audit(1542102084.908:57): pid=8200 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir193773234/syzkaller.thNnwu/19/file0" dev="sda1" ino=16586 res=1 09:41:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x10000008994, &(0x7f0000000080)={'bond0\x00\x00Z\x00', @ifru_ivalue=0x20b17d7b}) [ 237.307459] audit: type=1800 audit(1542102084.908:58): pid=8200 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16586 res=0 09:41:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a613a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000d94f2f22924a7a5ea9"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) r2 = dup3(r0, r1, 0x80000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x4, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setitimer(0x2, &(0x7f0000002940)={{0x0, 0x7530}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0), 0x4) 09:41:25 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f857150") r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x34, 0x1) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f0000000440)={&(0x7f0000000140)={0x1458e6fda6d06f5c, 0x0, 0x0, 0x70bd2b, 0x25dfdbfc}, 0x24a}, 0x1, 0x0, 0x0, 0x10}, 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f00000002c0)=ANY=[]) personality(0xc) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) prctl$seccomp(0x16, 0x3, &(0x7f00000002c0)={0x1, &(0x7f0000000240)=[{0x5, 0x7, 0x7fff, 0xfffffffffffffe00}]}) fchdir(r1) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r2 = open(&(0x7f0000000480)='./file0\x00', 0x42042, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x4000, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x80004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000200)=0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) write(r2, &(0x7f0000000840)="fc015002a2a55e34dab67b7517766f3188a613b48bef6d2a2999d8da9474917335f8e2f9da2a75722ec004a5e6e244499c012b7a80b129b96d8fa518fef1eecc7743f4d9e96018d4ded15ff21514c13fa444e6f7fee6c2516c91723bf3646a5803887e502f26fc7cfd736ef2c59317e90d8a27ddc1a9d9510b306ede2aaafb95abbc44f0033f7e63c88beb46c697412d6083e6462ed5e06d6bab1352ff887771a302ad4d2c7322bf17eb05ec97", 0xad) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) sendfile(r2, r2, &(0x7f00000000c0)=0x2, 0x8080ffffff10) ioctl$int_out(r0, 0x2000000040045730, &(0x7f0000000000)) [ 237.425960] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 237.476551] audit: type=1400 audit(1542102085.238:59): avc: denied { map_create } for pid=8209 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 09:41:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2e010000, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) [ 237.625378] audit: type=1400 audit(1542102085.348:60): avc: denied { map_read map_write } for pid=8209 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 09:41:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a613a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000d94f2f22924a7a5ea9"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) r2 = dup3(r0, r1, 0x80000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x4, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setitimer(0x2, &(0x7f0000002940)={{0x0, 0x7530}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0), 0x4) [ 237.859669] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev fuse, type fuse) errno=-22 09:41:25 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x1014001, &(0x7f00000001c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = dup2(r0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440), r2, r3}}, 0x18) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r5, 0x2275, &(0x7f00000000c0)=0x10d060000) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x1, {{0xc, 0x0, 0x1}, 0x2}}, 0x18) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0xf30c000000000000, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfcf3) nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000200)={0x2, 0x2, 0x7, {r7, r8+30000000}}) [ 238.073337] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 09:41:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 09:41:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a613a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000d94f2f22924a7a5ea9"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) r2 = dup3(r0, r1, 0x80000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x4, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setitimer(0x2, &(0x7f0000002940)={{0x0, 0x7530}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0), 0x4) 09:41:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 09:41:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a613a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000d94f2f22924a7a5ea9"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) r2 = dup3(r0, r1, 0x80000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x4, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setitimer(0x2, &(0x7f0000002940)={{0x0, 0x7530}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0), 0x4) 09:41:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000003c0)={'bcsh0\x00'}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x4, 0x9, 0x20, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000340)) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000300)=@add_del={0x2, &(0x7f00000002c0)='irlan0\x00', 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x6, 0x8, &(0x7f0000000600)) 09:41:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a613a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000d94f2f22924a7a5ea9"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) r2 = dup3(r0, r1, 0x80000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x4, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setitimer(0x2, &(0x7f0000002940)={{0x0, 0x7530}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0), 0x4) 09:41:26 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f857150") r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x34, 0x1) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f0000000440)={&(0x7f0000000140)={0x1458e6fda6d06f5c, 0x0, 0x0, 0x70bd2b, 0x25dfdbfc}, 0x24a}, 0x1, 0x0, 0x0, 0x10}, 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f00000002c0)=ANY=[]) personality(0xc) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) prctl$seccomp(0x16, 0x3, &(0x7f00000002c0)={0x1, &(0x7f0000000240)=[{0x5, 0x7, 0x7fff, 0xfffffffffffffe00}]}) fchdir(r1) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r2 = open(&(0x7f0000000480)='./file0\x00', 0x42042, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x4000, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x80004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000200)=0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) write(r2, &(0x7f0000000840)="fc015002a2a55e34dab67b7517766f3188a613b48bef6d2a2999d8da9474917335f8e2f9da2a75722ec004a5e6e244499c012b7a80b129b96d8fa518fef1eecc7743f4d9e96018d4ded15ff21514c13fa444e6f7fee6c2516c91723bf3646a5803887e502f26fc7cfd736ef2c59317e90d8a27ddc1a9d9510b306ede2aaafb95abbc44f0033f7e63c88beb46c697412d6083e6462ed5e06d6bab1352ff887771a302ad4d2c7322bf17eb05ec97", 0xad) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) sendfile(r2, r2, &(0x7f00000000c0)=0x2, 0x8080ffffff10) ioctl$int_out(r0, 0x2000000040045730, &(0x7f0000000000)) 09:41:26 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x1014001, &(0x7f00000001c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = dup2(r0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440), r2, r3}}, 0x18) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r5, 0x2275, &(0x7f00000000c0)=0x10d060000) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x1, {{0xc, 0x0, 0x1}, 0x2}}, 0x18) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0xf30c000000000000, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfcf3) nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000200)={0x2, 0x2, 0x7, {r7, r8+30000000}}) 09:41:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a613a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000d94f2f22924a7a5ea9"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) r2 = dup3(r0, r1, 0x80000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x4, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setitimer(0x2, &(0x7f0000002940)={{0x0, 0x7530}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0), 0x4) 09:41:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a613a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000d94f2f22924a7a5ea9"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) r2 = dup3(r0, r1, 0x80000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x4, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setitimer(0x2, &(0x7f0000002940)={{0x0, 0x7530}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0), 0x4) [ 239.267546] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 09:41:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a613a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000d94f2f22924a7a5ea9"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) r2 = dup3(r0, r1, 0x80000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x4, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setitimer(0x2, &(0x7f0000002940)={{0x0, 0x7530}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0), 0x4) 09:41:27 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r0, &(0x7f0000003900)={&(0x7f00000000c0)=@un=@abs, 0x80, &(0x7f00000038c0)=[{&(0x7f0000000240)="16714da900a12816d40c443501f1a26a", 0x10}], 0x1, &(0x7f0000000280)}, 0x0) 09:41:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000300)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mtu(r1, 0x0, 0x12, &(0x7f0000000000), 0x4) [ 239.568256] raw_sendmsg: syz-executor1 forgot to set AF_INET. Fix it! 09:41:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) 09:41:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006780), 0x5b, 0x0) 09:41:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000) r2 = accept4(r1, &(0x7f0000000340)=@alg, &(0x7f0000000040)=0x80, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$setendian(0x14, 0x1) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x2e11}, 0x8) shutdown(r2, 0x0) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmmsg$alg(r2, &(0x7f0000000700)=[{0x40000005, 0x0, &(0x7f0000000680)=[{&(0x7f0000000000)='C', 0x1}], 0x1}], 0x1, 0x0) 09:41:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000003c0)={'bcsh0\x00'}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x4, 0x9, 0x20, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000340)) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000300)=@add_del={0x2, &(0x7f00000002c0)='irlan0\x00', 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x6, 0x8, &(0x7f0000000600)) 09:41:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) 09:41:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a613a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000d94f2f22924a7a5ea9"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) r2 = dup3(r0, r1, 0x80000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x4, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setitimer(0x2, &(0x7f0000002940)={{0x0, 0x7530}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0), 0x4) 09:41:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006780), 0x5b, 0x0) 09:41:27 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x1014001, &(0x7f00000001c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = dup2(r0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440), r2, r3}}, 0x18) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r5, 0x2275, &(0x7f00000000c0)=0x10d060000) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x1, {{0xc, 0x0, 0x1}, 0x2}}, 0x18) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0xf30c000000000000, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfcf3) nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000200)={0x2, 0x2, 0x7, {r7, r8+30000000}}) [ 240.201518] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 09:41:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) 09:41:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006780), 0x5b, 0x0) 09:41:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a613a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000d94f2f22924a7a5ea9"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) r2 = dup3(r0, r1, 0x80000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x4, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setitimer(0x2, &(0x7f0000002940)={{0x0, 0x7530}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0), 0x4) 09:41:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006780), 0x5b, 0x0) 09:41:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) 09:41:28 executing program 1: syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x4040) 09:41:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x80) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) 09:41:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) 09:41:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000080)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 09:41:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40284504, &(0x7f0000000180)=[0x4f34]) 09:41:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 09:41:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x2) 09:41:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000080)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 09:41:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 09:41:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000080)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 09:41:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) msgget$private(0x0, 0x60) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000300), &(0x7f0000000340)=0x1) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000003c0)={'syzkaller0\x00'}) clock_gettime(0x0, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000640)=0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000140)={0xf7, @local, 0x4e22, 0x4, 'rr\x00', 0x2, 0x8d52, 0x74}, 0x2c) fcntl$getown(0xffffffffffffffff, 0x9) rt_tgsigqueueinfo(r1, 0x0, 0x3e, &(0x7f0000000680)={0xf, 0x3814, 0x0, 0x9}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x802, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f00000004c0)="9909f733286f47716aba189037ddd31cc861c35a0a0281dbf5418bed7368780d7de8bb1061dfac572a18a90b1837a9d7b4c319d5f6a2bceb42c62c5170ad943aa042257a26638443a37b50e13a5c9f3f58237b0322e719a1f8c79ce1308a7e3598ee09d80fa5d7b8688df96ac84f243caf590f6d31cf6f2f735deab7561c8054b13a449e43ad38c81564e5827d9c27ed0b5f093c53dfb9f47f3eebf1390cd5951d03ef11e94df68a6747830363", 0xad) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000980)={0x0, 0x81}, &(0x7f00000009c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000a80)={r4, 0x7fff}, &(0x7f0000000a40)=0xfde9) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000006c0)={0x0, 0x0, 0x4}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0)=0x5, 0x4) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) poll(&(0x7f0000000800), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000780)) write$sndseq(r3, &(0x7f00000007c0)=[{0x1, 0x0, 0x0, 0x0, @time={0x0, 0x1c9c380}, {0x5, 0x7}, {0x0, 0x100000000}, @raw8={"950276bf3bf362280a3b4a64"}}, {0x8c4d, 0x1, 0x0, 0x8, @tick=0x6, {0x8, 0x1000}, {0x100000000, 0x40}, @quote={{0x8, 0x3}, 0x3, &(0x7f00000002c0)={0x7, 0x3, 0x5, 0x71d6cd85, @tick=0xbea, {0x81, 0x7ff}, {0x0, 0x7}, @connect={{0xffffffff80000001, 0x1}, {0x5, 0x9}}}}}, {0x0, 0x84, 0x0, 0x0, @time={0x0, 0x1c9c380}, {0x0, 0x4}, {0x80000000, 0x1}, @addr={0xbc}}], 0x90) prctl$getreaper(0x1b, &(0x7f0000000200)) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000b00)=""/184, 0xffffffffffffff0f) umount2(&(0x7f0000000180)='./file0\x00', 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x0, 0x0, 0x3}}, 0xa) 09:41:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x2) [ 241.503656] ================================================================== [ 241.511465] BUG: KASAN: use-after-free in vhost_work_queue+0xc3/0xe0 [ 241.517975] Read of size 8 at addr ffff88817cf602e8 by task syz-executor5/8399 [ 241.525338] [ 241.526989] CPU: 1 PID: 8399 Comm: syz-executor5 Not tainted 4.20.0-rc2+ #112 [ 241.534277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.543643] Call Trace: [ 241.546323] dump_stack+0x244/0x39d [ 241.549987] ? dump_stack_print_info.cold.1+0x20/0x20 [ 241.555266] ? printk+0xa7/0xcf [ 241.558992] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 241.563814] print_address_description.cold.7+0x9/0x1ff [ 241.569193] kasan_report.cold.8+0x242/0x309 [ 241.573617] ? vhost_work_queue+0xc3/0xe0 [ 241.577791] __asan_report_load8_noabort+0x14/0x20 [ 241.582736] vhost_work_queue+0xc3/0xe0 [ 241.586725] vhost_transport_send_pkt+0x28a/0x380 [ 241.591579] ? vhost_vsock_dev_open+0x5a0/0x5a0 [ 241.596325] ? virtio_transport_send_pkt_info+0x2e7/0x460 [ 241.601927] ? __local_bh_enable_ip+0x160/0x260 [ 241.606612] virtio_transport_send_pkt_info+0x31d/0x460 [ 241.611998] virtio_transport_connect+0x17c/0x220 [ 241.616854] ? virtio_transport_send_pkt_info+0x460/0x460 [ 241.622402] ? vsock_auto_bind+0xa9/0xe0 [ 241.626562] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 241.632204] vsock_stream_connect+0x4ed/0xe40 [ 241.636710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.642268] ? vsock_dgram_connect+0x500/0x500 [ 241.646859] ? __local_bh_enable_ip+0x160/0x260 [ 241.651601] ? _raw_spin_unlock_bh+0x30/0x40 [ 241.656068] ? finish_wait+0x430/0x430 [ 241.659976] ? __release_sock+0x3a0/0x3a0 [ 241.664115] ? __local_bh_enable_ip+0x160/0x260 [ 241.668819] ? selinux_netlbl_socket_connect+0xa0/0xc0 [ 241.674132] ? selinux_socket_connect+0x6c/0x80 [ 241.678809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.684360] ? security_socket_connect+0x94/0xc0 [ 241.689114] __sys_connect+0x37d/0x4c0 [ 241.692996] ? __ia32_sys_accept+0xb0/0xb0 [ 241.697255] ? kasan_check_read+0x11/0x20 [ 241.701420] ? _copy_to_user+0xc8/0x110 [ 241.705389] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 241.710951] ? put_timespec64+0x10f/0x1b0 [ 241.715104] ? do_syscall_64+0x9a/0x820 [ 241.719072] ? do_syscall_64+0x9a/0x820 [ 241.723043] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 241.727712] ? trace_hardirqs_on+0xbd/0x310 [ 241.732024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.737551] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.742908] ? trace_hardirqs_off_caller+0x310/0x310 [ 241.748029] __x64_sys_connect+0x73/0xb0 [ 241.752083] do_syscall_64+0x1b9/0x820 [ 241.755961] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 241.761317] ? syscall_return_slowpath+0x5e0/0x5e0 [ 241.766253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.771088] ? trace_hardirqs_on_caller+0x310/0x310 [ 241.776109] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 241.781119] ? prepare_exit_to_usermode+0x291/0x3b0 [ 241.786129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.790966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.796142] RIP: 0033:0x457569 [ 241.799326] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.818213] RSP: 002b:00007f1a5a6f8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 241.825909] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 241.833168] RDX: 0000000000000010 RSI: 0000000020000200 RDI: 0000000000000006 [ 241.840425] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 241.847680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a5a6f96d4 [ 241.854935] R13: 00000000004bdb06 R14: 00000000004cc9b8 R15: 00000000ffffffff [ 241.862198] [ 241.863815] Allocated by task 8399: [ 241.867430] save_stack+0x43/0xd0 [ 241.870871] kasan_kmalloc+0xc7/0xe0 [ 241.874569] __kmalloc_node+0x50/0x70 [ 241.878417] kvmalloc_node+0xb9/0xf0 [ 241.882123] vhost_vsock_dev_open+0xa2/0x5a0 [ 241.886538] misc_open+0x3ca/0x560 [ 241.890080] chrdev_open+0x25a/0x710 [ 241.893799] do_dentry_open+0x499/0x1250 [ 241.897847] vfs_open+0xa0/0xd0 [ 241.901133] path_openat+0x12bc/0x5150 [ 241.905006] do_filp_open+0x255/0x380 [ 241.908795] do_sys_open+0x568/0x700 [ 241.912494] __x64_sys_openat+0x9d/0x100 [ 241.916547] do_syscall_64+0x1b9/0x820 [ 241.920419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.925587] [ 241.927209] Freed by task 8398: [ 241.930481] save_stack+0x43/0xd0 [ 241.933920] __kasan_slab_free+0x102/0x150 [ 241.938145] kasan_slab_free+0xe/0x10 [ 241.941930] kfree+0xcf/0x230 [ 241.945032] kvfree+0x61/0x70 [ 241.948126] vhost_vsock_dev_release+0x4f4/0x720 [ 241.952870] __fput+0x385/0xa30 [ 241.956134] ____fput+0x15/0x20 [ 241.959442] task_work_run+0x1e8/0x2a0 [ 241.963319] exit_to_usermode_loop+0x318/0x380 [ 241.967892] do_syscall_64+0x6be/0x820 [ 241.971768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.976940] [ 241.978555] The buggy address belongs to the object at ffff88817cf60240 [ 241.978555] which belongs to the cache kmalloc-64k of size 65536 [ 241.991375] The buggy address is located 168 bytes inside of [ 241.991375] 65536-byte region [ffff88817cf60240, ffff88817cf70240) [ 242.003405] The buggy address belongs to the page: [ 242.008319] page:ffffea0005f3d800 count:1 mapcount:0 mapping:ffff8881da802500 index:0x0 compound_mapcount: 0 [ 242.018273] flags: 0x2fffc0000010200(slab|head) [ 242.022929] raw: 02fffc0000010200 ffffea0005f3e808 ffffea0005f22808 ffff8881da802500 [ 242.030797] raw: 0000000000000000 ffff88817cf60240 0000000100000001 0000000000000000 [ 242.038658] page dumped because: kasan: bad access detected [ 242.044350] [ 242.045958] Memory state around the buggy address: [ 242.050876] ffff88817cf60180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 242.058228] ffff88817cf60200: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 242.065575] >ffff88817cf60280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 242.072934] ^ [ 242.079671] ffff88817cf60300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 242.087014] ffff88817cf60380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 242.094353] ================================================================== 09:41:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000080)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 09:41:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000080)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 09:41:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 09:41:29 executing program 3: mkdir(&(0x7f0000000880)='./file0\x00', 0x800000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x0, 0xfffffffffffffffe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa5e0936e7f46bf5c) fchmodat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000008c0)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7ff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0xfffffffffffff800, 0x73e}) ioprio_get$pid(0x1, r0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0xfffffffffffffd14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000000000000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000600)={0x6fd3}, 0x4) clone(0x3003, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="907d32897043a75d2f4c569388262e459497c5d641504f09cce744b2a834873892d4721fd9210f316f868d4f8c8a9e9f031d57d6cdbdd601b7e03f1fe511a6c64e3467931f18238c03de02b249bf519f9bdcd7bd633bfb9b3d2dda9690e8e6f51686e111845b21e238c7b0", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x4) rt_sigreturn() getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000380)=[@in={0x2, 0x4e22, @local}]}, &(0x7f0000000540)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000480), &(0x7f0000000400)=0xffffffffffffffd7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000002c0)={0x7, 0x70, 0x6, 0x7, 0x5, 0x8, 0x0, 0x3, 0x80000, 0xf, 0x8, 0x3, 0x8, 0x3, 0xfff, 0x3, 0x5, 0x100, 0x3cb6, 0x0, 0x5, 0xfffffffffffffffa, 0xfffffffffffffffb, 0x80000000, 0x8, 0x3, 0xd9, 0xfffffffffffffffa, 0xc6, 0xfffffffffffffffc, 0xdb, 0x8, 0x9, 0xff, 0x4, 0x9, 0x5, 0x9, 0x0, 0x400, 0x5, @perf_config_ext={0x1, 0x1}, 0x2000, 0x0, 0x1, 0xd, 0x86, 0x4, 0x5}) getpid() write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000440)={0xffffffffffffffa0, 0x11, 0x2, {0x20}}, 0x14) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:41:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) [ 242.101693] Disabling lock debugging due to kernel taint [ 242.122234] MINIX-fs: mounting unchecked file system, running fsck is recommended 09:41:29 executing program 3: mkdir(&(0x7f0000000880)='./file0\x00', 0x800000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x0, 0xfffffffffffffffe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa5e0936e7f46bf5c) fchmodat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000008c0)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7ff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0xfffffffffffff800, 0x73e}) ioprio_get$pid(0x1, r0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0xfffffffffffffd14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000000000000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000600)={0x6fd3}, 0x4) clone(0x3003, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="907d32897043a75d2f4c569388262e459497c5d641504f09cce744b2a834873892d4721fd9210f316f868d4f8c8a9e9f031d57d6cdbdd601b7e03f1fe511a6c64e3467931f18238c03de02b249bf519f9bdcd7bd633bfb9b3d2dda9690e8e6f51686e111845b21e238c7b0", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x4) rt_sigreturn() getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000380)=[@in={0x2, 0x4e22, @local}]}, &(0x7f0000000540)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000480), &(0x7f0000000400)=0xffffffffffffffd7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000002c0)={0x7, 0x70, 0x6, 0x7, 0x5, 0x8, 0x0, 0x3, 0x80000, 0xf, 0x8, 0x3, 0x8, 0x3, 0xfff, 0x3, 0x5, 0x100, 0x3cb6, 0x0, 0x5, 0xfffffffffffffffa, 0xfffffffffffffffb, 0x80000000, 0x8, 0x3, 0xd9, 0xfffffffffffffffa, 0xc6, 0xfffffffffffffffc, 0xdb, 0x8, 0x9, 0xff, 0x4, 0x9, 0x5, 0x9, 0x0, 0x400, 0x5, @perf_config_ext={0x1, 0x1}, 0x2000, 0x0, 0x1, 0xd, 0x86, 0x4, 0x5}) getpid() write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000440)={0xffffffffffffffa0, 0x11, 0x2, {0x20}}, 0x14) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:41:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x2) [ 242.176828] minix_free_inode: bit 1 already cleared [ 242.246966] Kernel panic - not syncing: panic_on_warn set ... [ 242.253008] CPU: 1 PID: 8399 Comm: syz-executor5 Tainted: G B 4.20.0-rc2+ #112 [ 242.261675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.271029] Call Trace: [ 242.273627] dump_stack+0x244/0x39d [ 242.277261] ? dump_stack_print_info.cold.1+0x20/0x20 [ 242.282514] panic+0x2ad/0x55c [ 242.285707] ? add_taint.cold.5+0x16/0x16 [ 242.289844] ? preempt_schedule+0x4d/0x60 [ 242.293983] ? ___preempt_schedule+0x16/0x18 [ 242.298378] ? trace_hardirqs_on+0xb4/0x310 [ 242.302687] kasan_end_report+0x47/0x4f [ 242.306647] kasan_report.cold.8+0x76/0x309 [ 242.310951] ? vhost_work_queue+0xc3/0xe0 [ 242.315082] __asan_report_load8_noabort+0x14/0x20 [ 242.320008] vhost_work_queue+0xc3/0xe0 [ 242.323975] vhost_transport_send_pkt+0x28a/0x380 [ 242.328814] ? vhost_vsock_dev_open+0x5a0/0x5a0 [ 242.333735] ? virtio_transport_send_pkt_info+0x2e7/0x460 [ 242.339256] ? __local_bh_enable_ip+0x160/0x260 [ 242.343912] virtio_transport_send_pkt_info+0x31d/0x460 [ 242.349261] virtio_transport_connect+0x17c/0x220 [ 242.354087] ? virtio_transport_send_pkt_info+0x460/0x460 [ 242.359604] ? vsock_auto_bind+0xa9/0xe0 [ 242.363653] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 242.369174] vsock_stream_connect+0x4ed/0xe40 [ 242.373672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.379210] ? vsock_dgram_connect+0x500/0x500 [ 242.383776] ? __local_bh_enable_ip+0x160/0x260 [ 242.388429] ? _raw_spin_unlock_bh+0x30/0x40 [ 242.392820] ? finish_wait+0x430/0x430 [ 242.396695] ? __release_sock+0x3a0/0x3a0 [ 242.400835] ? __local_bh_enable_ip+0x160/0x260 [ 242.405489] ? selinux_netlbl_socket_connect+0xa0/0xc0 [ 242.410752] ? selinux_socket_connect+0x6c/0x80 [ 242.415410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.420931] ? security_socket_connect+0x94/0xc0 [ 242.425673] __sys_connect+0x37d/0x4c0 [ 242.429557] ? __ia32_sys_accept+0xb0/0xb0 [ 242.433787] ? kasan_check_read+0x11/0x20 [ 242.438019] ? _copy_to_user+0xc8/0x110 [ 242.441983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 242.447504] ? put_timespec64+0x10f/0x1b0 [ 242.451640] ? do_syscall_64+0x9a/0x820 [ 242.455598] ? do_syscall_64+0x9a/0x820 [ 242.459567] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 242.464133] ? trace_hardirqs_on+0xbd/0x310 [ 242.468438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.473961] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.479310] ? trace_hardirqs_off_caller+0x310/0x310 [ 242.484398] __x64_sys_connect+0x73/0xb0 [ 242.488444] do_syscall_64+0x1b9/0x820 [ 242.492311] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 242.497658] ? syscall_return_slowpath+0x5e0/0x5e0 [ 242.502579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.507410] ? trace_hardirqs_on_caller+0x310/0x310 [ 242.512411] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 242.517412] ? prepare_exit_to_usermode+0x291/0x3b0 [ 242.522415] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.527241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.532413] RIP: 0033:0x457569 [ 242.535613] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 242.554500] RSP: 002b:00007f1a5a6f8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 242.562196] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 242.569467] RDX: 0000000000000010 RSI: 0000000020000200 RDI: 0000000000000006 [ 242.576724] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 242.583981] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a5a6f96d4 [ 242.591241] R13: 00000000004bdb06 R14: 00000000004cc9b8 R15: 00000000ffffffff [ 242.599852] Kernel Offset: disabled [ 242.603475] Rebooting in 86400 seconds..