[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[   35.327161][   T25] audit: type=1800 audit(1572050422.580:25): pid=7095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0
[   35.347008][   T25] audit: type=1800 audit(1572050422.580:26): pid=7095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0
[   35.367023][   T25] audit: type=1800 audit(1572050422.580:27): pid=7095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.189' (ECDSA) to the list of known hosts.
2019/10/26 00:40:33 fuzzer started
2019/10/26 00:40:35 dialing manager at 10.128.0.105:32811
2019/10/26 00:40:38 syscalls: 2533
2019/10/26 00:40:38 code coverage: enabled
2019/10/26 00:40:38 comparison tracing: enabled
2019/10/26 00:40:38 extra coverage: extra coverage is not supported by the kernel
2019/10/26 00:40:38 setuid sandbox: enabled
2019/10/26 00:40:38 namespace sandbox: enabled
2019/10/26 00:40:38 Android sandbox: /sys/fs/selinux/policy does not exist
2019/10/26 00:40:38 fault injection: enabled
2019/10/26 00:40:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/10/26 00:40:38 net packet injection: enabled
2019/10/26 00:40:38 net device setup: enabled
2019/10/26 00:40:38 concurrency sanitizer: enabled
syzkaller login: [   54.457280][ T7262] KCSAN: could not find function: 'poll_schedule_timeout'
2019/10/26 00:40:52 adding functions to KCSAN blacklist: 'snd_seq_check_queue' 'timer_clear_idle' 'ext4_free_inode' 'ep_poll' 'update_defense_level' 'run_timer_softirq' 'tcp_add_backlog' 'mod_timer' 'ext4_has_free_clusters' 'wbt_issue' '__dentry_kill' 'tick_nohz_idle_stop_tick' 'poll_schedule_timeout' 'tomoyo_supervisor' 'echo_char' 'dd_has_work' '__ext4_new_inode' 'xas_clear_mark' 'shmem_file_read_iter' 'xas_find_marked' 'generic_fillattr' 'task_dump_owner' 'do_nanosleep' 'tcp_poll' 'tick_sched_do_timer' 'add_timer' 'schedule_hrtimeout_range_clock' '__snd_rawmidi_transmit_ack' 'p9_poll_workfn' 'ext4_mb_good_group' 'do_syslog' 'ext4_mark_iloc_dirty' 'mm_update_next_owner' 'unix_release_sock' 'rcu_gp_fqs_check_wake' 'common_perm_cond' 'add_timer_on' 'find_next_bit' 'taskstats_exit' 'ktime_get_seconds' 'blk_mq_sched_dispatch_requests' '__nf_ct_refresh_acct' 'generic_write_end' 'pipe_poll' '__hrtimer_run_queues' 'ktime_get_real_seconds' 'pid_update_inode' 'blk_mq_get_request' 'vm_area_dup' '__tcp_select_window' 'generic_permission' 'tick_do_update_jiffies64' '__rb_erase_color' '__splice_from_pipe' 'blk_mq_dispatch_rq_list' 
00:42:30 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
rt_sigaction(0x30, &(0x7f0000000240)={0x0, {}, 0x0, 0x0}, &(0x7f0000000440)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000480))

00:42:30 executing program 1:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

[  163.046557][ T7265] IPVS: ftp: loaded support on port[0] = 21
[  163.201210][ T7265] chnl_net:caif_netlink_parms(): no params data found
[  163.274824][ T7268] IPVS: ftp: loaded support on port[0] = 21
[  163.288867][ T7265] bridge0: port 1(bridge_slave_0) entered blocking state
[  163.302743][ T7265] bridge0: port 1(bridge_slave_0) entered disabled state
[  163.311232][ T7265] device bridge_slave_0 entered promiscuous mode
00:42:30 executing program 2:
r0 = socket$inet(0x2, 0x5000000000000001, 0x0)
setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @rand_addr=0xffffffffedddb9a5}}}, 0x88)
close(r0)

[  163.330811][ T7265] bridge0: port 2(bridge_slave_1) entered blocking state
[  163.338777][ T7265] bridge0: port 2(bridge_slave_1) entered disabled state
[  163.347271][ T7265] device bridge_slave_1 entered promiscuous mode
[  163.391859][ T7265] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  163.411902][ T7265] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  163.478985][ T7265] team0: Port device team_slave_0 added
[  163.486629][ T7265] team0: Port device team_slave_1 added
[  163.578651][ T7265] device hsr_slave_0 entered promiscuous mode
[  163.625746][ T7265] device hsr_slave_1 entered promiscuous mode
[  163.656503][ T7268] chnl_net:caif_netlink_parms(): no params data found
00:42:31 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_X86_SET_MCE(r2, 0x9000aea4, &(0x7f0000000040))

[  163.690983][ T7271] IPVS: ftp: loaded support on port[0] = 21
[  163.782772][ T7268] bridge0: port 1(bridge_slave_0) entered blocking state
[  163.803297][ T7268] bridge0: port 1(bridge_slave_0) entered disabled state
[  163.828100][ T7268] device bridge_slave_0 entered promiscuous mode
[  163.868895][ T7268] bridge0: port 2(bridge_slave_1) entered blocking state
[  163.878140][ T7268] bridge0: port 2(bridge_slave_1) entered disabled state
[  163.888653][ T7268] device bridge_slave_1 entered promiscuous mode
[  163.897389][ T7265] bridge0: port 2(bridge_slave_1) entered blocking state
[  163.904439][ T7265] bridge0: port 2(bridge_slave_1) entered forwarding state
[  163.911836][ T7265] bridge0: port 1(bridge_slave_0) entered blocking state
[  163.918911][ T7265] bridge0: port 1(bridge_slave_0) entered forwarding state
[  164.056717][ T7268] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  164.138384][ T7268] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  164.255523][ T7265] 8021q: adding VLAN 0 to HW filter on device bond0
[  164.305605][ T3501] bridge0: port 1(bridge_slave_0) entered disabled state
[  164.335630][ T3501] bridge0: port 2(bridge_slave_1) entered disabled state
[  164.349555][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  164.415282][ T7265] 8021q: adding VLAN 0 to HW filter on device team0
[  164.454331][ T7268] team0: Port device team_slave_0 added
[  164.487120][ T7283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  164.507446][ T7283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  164.546385][ T7268] team0: Port device team_slave_1 added
[  164.559286][ T7298] IPVS: ftp: loaded support on port[0] = 21
[  164.583886][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  164.598137][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  164.646253][   T17] bridge0: port 1(bridge_slave_0) entered blocking state
[  164.653331][   T17] bridge0: port 1(bridge_slave_0) entered forwarding state
[  164.686216][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  164.717966][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  164.746316][   T17] bridge0: port 2(bridge_slave_1) entered blocking state
[  164.753371][   T17] bridge0: port 2(bridge_slave_1) entered forwarding state
00:42:32 executing program 4:
r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e)
add_key$user(0x0, &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000040)={0x0, r0}, 0x0, 0x0, &(0x7f00000002c0)={0x0})

[  164.800383][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  164.847112][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  164.878562][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  164.906838][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  164.927008][ T7271] chnl_net:caif_netlink_parms(): no params data found
[  164.959772][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  164.992845][ T7265] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  165.025388][ T7265] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  165.120831][ T7268] device hsr_slave_0 entered promiscuous mode
[  165.185841][ T7268] device hsr_slave_1 entered promiscuous mode
[  165.218003][ T7268] debugfs: Directory 'hsr0' with parent '/' already present!
[  165.246631][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  165.273037][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  165.306823][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  165.346100][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  165.378693][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  165.406319][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  165.438809][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  165.503521][ T7303] IPVS: ftp: loaded support on port[0] = 21
[  165.680232][ T7265] 8021q: adding VLAN 0 to HW filter on device batadv0
[  165.711913][ T7271] bridge0: port 1(bridge_slave_0) entered blocking state
[  165.777774][ T7271] bridge0: port 1(bridge_slave_0) entered disabled state
[  165.854949][ T7271] device bridge_slave_0 entered promiscuous mode
00:42:33 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
creat(0x0, 0x0)
socket$can_bcm(0x1d, 0x2, 0x2)
r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, <r3=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000100)=0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r5, 0x5, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xf00, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0)
sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x68, r5, 0x100, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8080}, 0x4)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
close(0xffffffffffffffff)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c7465720000001f4b47f925bba7d652e1d35f00000000000000000000000000000000000000000000000e00000004000000d8030000e8010000f0000000e80100000916c36205a327c8df6f", @ANYPTR, @ANYBLOB], 0x3)

[  165.931063][ T7271] bridge0: port 2(bridge_slave_1) entered blocking state
[  165.969528][ T7271] bridge0: port 2(bridge_slave_1) entered disabled state
[  166.026438][ T7271] device bridge_slave_1 entered promiscuous mode
[  166.208504][ T7271] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  166.351952][ T7271] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  166.395417][ T7298] chnl_net:caif_netlink_parms(): no params data found
[  166.476373][ T7271] team0: Port device team_slave_0 added
[  166.588486][ T7271] team0: Port device team_slave_1 added
[  166.721207][ T7298] bridge0: port 1(bridge_slave_0) entered blocking state
[  166.730925][ T7298] bridge0: port 1(bridge_slave_0) entered disabled state
[  166.779434][ T7298] device bridge_slave_0 entered promiscuous mode
[  166.793364][ T7268] 8021q: adding VLAN 0 to HW filter on device bond0
[  166.818788][ T7303] chnl_net:caif_netlink_parms(): no params data found
00:42:34 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

[  166.888459][ T7271] device hsr_slave_0 entered promiscuous mode
[  166.955695][ T7271] device hsr_slave_1 entered promiscuous mode
[  166.975859][    C0] hrtimer: interrupt took 36411 ns
[  166.985540][ T7271] debugfs: Directory 'hsr0' with parent '/' already present!
[  166.994320][ T7298] bridge0: port 2(bridge_slave_1) entered blocking state
[  167.002159][ T7298] bridge0: port 2(bridge_slave_1) entered disabled state
[  167.066489][ T7298] device bridge_slave_1 entered promiscuous mode
[  167.136143][ T7268] 8021q: adding VLAN 0 to HW filter on device team0
[  167.179057][ T7341] IPVS: ftp: loaded support on port[0] = 21
[  167.185856][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  167.214686][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  167.355610][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  167.392955][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  167.436565][   T17] bridge0: port 1(bridge_slave_0) entered blocking state
[  167.443714][   T17] bridge0: port 1(bridge_slave_0) entered forwarding state
[  167.511895][ T7298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  167.577365][ T7298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
00:42:34 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

[  167.755876][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  167.763930][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  167.866183][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  167.925817][ T2987] bridge0: port 2(bridge_slave_1) entered blocking state
[  167.932885][ T2987] bridge0: port 2(bridge_slave_1) entered forwarding state
[  168.041627][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  168.105206][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  168.202074][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  168.239974][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  168.309611][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  168.336263][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
00:42:35 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

[  168.442993][ T7303] bridge0: port 1(bridge_slave_0) entered blocking state
[  168.475545][ T7303] bridge0: port 1(bridge_slave_0) entered disabled state
[  168.483659][ T7303] device bridge_slave_0 entered promiscuous mode
[  168.569754][ T7268] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  168.649541][ T7268] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  168.739112][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  168.789656][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  168.834048][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  168.921523][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  168.990822][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  169.064020][ T7298] team0: Port device team_slave_0 added
[  169.093773][ T7303] bridge0: port 2(bridge_slave_1) entered blocking state
[  169.113789][ T7303] bridge0: port 2(bridge_slave_1) entered disabled state
[  169.164413][ T7303] device bridge_slave_1 entered promiscuous mode
[  169.283486][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  169.339317][ T7298] team0: Port device team_slave_1 added
[  169.351109][ T7268] 8021q: adding VLAN 0 to HW filter on device batadv0
[  169.410699][ T7271] 8021q: adding VLAN 0 to HW filter on device bond0
[  169.484742][ T7303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  169.622822][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  169.642367][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  169.701895][ T7303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  169.736836][ T7271] 8021q: adding VLAN 0 to HW filter on device team0
[  169.755030][ T7341] chnl_net:caif_netlink_parms(): no params data found
[  169.878345][ T7298] device hsr_slave_0 entered promiscuous mode
00:42:37 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

[  169.945766][ T7298] device hsr_slave_1 entered promiscuous mode
[  169.988483][ T7298] debugfs: Directory 'hsr0' with parent '/' already present!
[  170.087032][ T7303] team0: Port device team_slave_0 added
[  170.100283][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  170.131750][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  170.210694][   T26] bridge0: port 1(bridge_slave_0) entered blocking state
[  170.217829][   T26] bridge0: port 1(bridge_slave_0) entered forwarding state
[  170.259972][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  170.309747][   T25] kauditd_printk_skb: 3 callbacks suppressed
[  170.309778][   T25] audit: type=1804 audit(1572050557.560:31): pid=7427 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir168462288/syzkaller.BDAEDl/0/bus" dev="sda1" ino=16532 res=1
[  170.364749][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  170.420721][   T26] bridge0: port 2(bridge_slave_1) entered blocking state
[  170.428005][   T26] bridge0: port 2(bridge_slave_1) entered forwarding state
[  170.468823][   T25] audit: type=1804 audit(1572050557.610:32): pid=7432 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir168462288/syzkaller.BDAEDl/0/bus" dev="sda1" ino=16532 res=1
[  170.505190][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  170.612295][ T7303] team0: Port device team_slave_1 added
[  170.626610][ T7341] bridge0: port 1(bridge_slave_0) entered blocking state
[  170.633866][ T7341] bridge0: port 1(bridge_slave_0) entered disabled state
[  170.692325][ T7341] device bridge_slave_0 entered promiscuous mode
[  170.726483][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  170.749188][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  170.801649][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  170.854095][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  170.912290][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  170.973246][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  171.066897][ T7341] bridge0: port 2(bridge_slave_1) entered blocking state
[  171.074333][ T7341] bridge0: port 2(bridge_slave_1) entered disabled state
[  171.100577][   T25] audit: type=1804 audit(1572050558.350:33): pid=7432 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir168462288/syzkaller.BDAEDl/0/bus" dev="sda1" ino=16532 res=1
[  171.184819][ T7341] device bridge_slave_1 entered promiscuous mode
[  171.213709][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  171.239839][   T25] audit: type=1804 audit(1572050558.350:34): pid=7445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir168462288/syzkaller.BDAEDl/0/bus" dev="sda1" ino=16532 res=1
[  171.240622][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  171.320091][   T25] audit: type=1804 audit(1572050558.410:35): pid=7427 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir168462288/syzkaller.BDAEDl/0/bus" dev="sda1" ino=16532 res=1
[  171.438030][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  171.470987][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  171.511820][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  171.553319][ T7271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  171.571505][ T7341] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  171.668564][ T7303] device hsr_slave_0 entered promiscuous mode
[  171.725838][ T7303] device hsr_slave_1 entered promiscuous mode
[  171.755103][ T7303] debugfs: Directory 'hsr0' with parent '/' already present!
[  171.794524][ T7341] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  171.858144][ T7271] 8021q: adding VLAN 0 to HW filter on device batadv0
[  171.911259][ T7341] team0: Port device team_slave_0 added
[  171.966014][ T7341] team0: Port device team_slave_1 added
[  172.200300][ T7341] device hsr_slave_0 entered promiscuous mode
[  172.270417][ T7341] device hsr_slave_1 entered promiscuous mode
[  172.315407][ T7341] debugfs: Directory 'hsr0' with parent '/' already present!
[  172.602026][ T7298] 8021q: adding VLAN 0 to HW filter on device bond0
[  172.718163][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  172.736225][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  172.799309][ T7303] 8021q: adding VLAN 0 to HW filter on device bond0
[  172.858358][ T7298] 8021q: adding VLAN 0 to HW filter on device team0
[  172.969969][ T7303] 8021q: adding VLAN 0 to HW filter on device team0
[  173.052387][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  173.061073][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  173.106273][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  173.176097][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  173.184602][   T26] bridge0: port 1(bridge_slave_0) entered blocking state
[  173.191814][   T26] bridge0: port 1(bridge_slave_0) entered forwarding state
[  173.341827][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  173.402295][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  173.466004][   T26] bridge0: port 2(bridge_slave_1) entered blocking state
[  173.473116][   T26] bridge0: port 2(bridge_slave_1) entered forwarding state
[  173.572361][   T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  173.651084][ T7341] 8021q: adding VLAN 0 to HW filter on device bond0
[  173.767045][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  173.775190][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
00:42:41 executing program 1:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

00:42:41 executing program 0:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

[  173.865591][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  173.874513][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  174.000439][ T2987] bridge0: port 1(bridge_slave_0) entered blocking state
[  174.007582][ T2987] bridge0: port 1(bridge_slave_0) entered forwarding state
[  174.070639][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  174.146473][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  174.174736][   T25] audit: type=1804 audit(1572050561.420:36): pid=7522 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir168462288/syzkaller.BDAEDl/1/bus" dev="sda1" ino=16543 res=1
[  174.221790][ T2987] bridge0: port 2(bridge_slave_1) entered blocking state
[  174.228930][ T2987] bridge0: port 2(bridge_slave_1) entered forwarding state
[  174.350358][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  174.423538][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  174.440601][   T25] audit: type=1804 audit(1572050561.530:37): pid=7520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir482282123/syzkaller.3Gq2W0/5/bus" dev="sda1" ino=16544 res=1
[  174.530569][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  174.614583][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  174.673402][   T25] audit: type=1804 audit(1572050561.570:38): pid=7522 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir168462288/syzkaller.BDAEDl/1/bus" dev="sda1" ino=16543 res=1
[  174.713333][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  174.802058][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  174.883963][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  174.896586][   T25] audit: type=1804 audit(1572050561.630:39): pid=7523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir482282123/syzkaller.3Gq2W0/5/bus" dev="sda1" ino=16544 res=1
[  174.979820][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  175.052014][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
00:42:42 executing program 0:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

[  175.202017][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  175.257737][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
00:42:42 executing program 1:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

[  175.311376][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  175.373046][ T7303] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  175.409328][   T25] audit: type=1804 audit(1572050562.660:40): pid=7529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir482282123/syzkaller.3Gq2W0/6/bus" dev="sda1" ino=16544 res=1
[  175.441001][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  175.500966][ T7341] 8021q: adding VLAN 0 to HW filter on device team0
[  175.542925][ T7298] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  175.567641][   T25] audit: type=1804 audit(1572050562.690:41): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir482282123/syzkaller.3Gq2W0/6/bus" dev="sda1" ino=16544 res=1
[  175.609653][ T7298] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
00:42:43 executing program 2:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

[  175.715752][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  175.724040][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  175.777740][   T25] audit: type=1804 audit(1572050562.990:42): pid=7533 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir168462288/syzkaller.BDAEDl/2/bus" dev="sda1" ino=16543 res=1
[  175.821383][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  175.891055][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  176.001501][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  176.005402][   T25] audit: type=1804 audit(1572050563.120:43): pid=7536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir168462288/syzkaller.BDAEDl/2/bus" dev="sda1" ino=16543 res=1
[  176.083638][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  176.146450][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  176.204249][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  176.240980][   T25] audit: type=1804 audit(1572050563.470:44): pid=7541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir253819641/syzkaller.VlFrjH/1/bus" dev="sda1" ino=16540 res=1
[  176.288581][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  176.350153][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  176.401496][ T7302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  176.434403][   T25] audit: type=1804 audit(1572050563.580:45): pid=7543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir253819641/syzkaller.VlFrjH/1/bus" dev="sda1" ino=16540 res=1
[  176.513238][ T7303] 8021q: adding VLAN 0 to HW filter on device batadv0
[  176.666635][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  176.674552][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  176.764517][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  176.809398][ T2987] bridge0: port 1(bridge_slave_0) entered blocking state
[  176.816528][ T2987] bridge0: port 1(bridge_slave_0) entered forwarding state
[  176.926617][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  176.968611][ T7298] 8021q: adding VLAN 0 to HW filter on device batadv0
[  177.046207][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  177.055072][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  177.116021][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[  177.123087][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[  177.223457][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  177.249881][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  177.326887][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  177.356444][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  177.440793][ T7341] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  177.552146][ T7341] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  177.622993][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  177.641111][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  177.694654][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  177.747057][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  177.767387][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  177.787901][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  177.827898][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  177.869133][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  177.948580][ T7341] 8021q: adding VLAN 0 to HW filter on device batadv0
[  178.102043][ T7581] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
00:42:45 executing program 3:
r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e)
add_key$user(0x0, &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000040)={0x0, r0}, 0x0, 0x0, &(0x7f00000002c0)={0x0})

00:42:45 executing program 0:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

[  178.525061][   T25] audit: type=1804 audit(1572050565.770:46): pid=7591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir482282123/syzkaller.3Gq2W0/7/bus" dev="sda1" ino=16553 res=1
[  178.592092][   T25] audit: type=1804 audit(1572050565.840:47): pid=7600 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir482282123/syzkaller.3Gq2W0/7/bus" dev="sda1" ino=16553 res=1
00:42:46 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
creat(0x0, 0x0)
socket$can_bcm(0x1d, 0x2, 0x2)
r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, <r3=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000100)=0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r5, 0x5, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xf00, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0)
sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x68, r5, 0x100, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8080}, 0x4)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
close(0xffffffffffffffff)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c7465720000001f4b47f925bba7d652e1d35f00000000000000000000000000000000000000000000000e00000004000000d8030000e8010000f0000000e80100000916c36205a327c8df6f", @ANYPTR, @ANYBLOB], 0x3)

00:42:46 executing program 1:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

00:42:46 executing program 4:
r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e)
add_key$user(0x0, &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000040)={0x0, r0}, 0x0, 0x0, &(0x7f00000002c0)={0x0})

00:42:46 executing program 2:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

00:42:46 executing program 3:
r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e)
add_key$user(0x0, &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000040)={0x0, r0}, 0x0, 0x0, &(0x7f00000002c0)={0x0})

[  178.943039][   T25] audit: type=1804 audit(1572050566.190:48): pid=7608 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir253819641/syzkaller.VlFrjH/2/bus" dev="sda1" ino=16570 res=1
00:42:46 executing program 4:
r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e)
add_key$user(0x0, &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000040)={0x0, r0}, 0x0, 0x0, &(0x7f00000002c0)={0x0})

00:42:46 executing program 3:
r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e)
add_key$user(0x0, &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000040)={0x0, r0}, 0x0, 0x0, &(0x7f00000002c0)={0x0})

[  179.048194][   T25] audit: type=1804 audit(1572050566.250:49): pid=7612 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir168462288/syzkaller.BDAEDl/3/bus" dev="sda1" ino=16569 res=1
00:42:46 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
creat(0x0, 0x0)
socket$can_bcm(0x1d, 0x2, 0x2)
r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, <r3=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000100)=0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r5, 0x5, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xf00, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0)
sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x68, r5, 0x100, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8080}, 0x4)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
close(0xffffffffffffffff)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c7465720000001f4b47f925bba7d652e1d35f00000000000000000000000000000000000000000000000e00000004000000d8030000e8010000f0000000e80100000916c36205a327c8df6f", @ANYPTR, @ANYBLOB], 0x3)

00:42:46 executing program 2:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

00:42:46 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
creat(0x0, 0x0)
socket$can_bcm(0x1d, 0x2, 0x2)
r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, <r3=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000100)=0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r5, 0x5, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xf00, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0)
sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x68, r5, 0x100, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8080}, 0x4)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
close(0xffffffffffffffff)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c7465720000001f4b47f925bba7d652e1d35f00000000000000000000000000000000000000000000000e00000004000000d8030000e8010000f0000000e80100000916c36205a327c8df6f", @ANYPTR, @ANYBLOB], 0x3)

00:42:46 executing program 4:
r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e)
add_key$user(0x0, &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000040)={0x0, r0}, 0x0, 0x0, &(0x7f00000002c0)={0x0})

00:42:46 executing program 3:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

00:42:47 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
creat(0x0, 0x0)
socket$can_bcm(0x1d, 0x2, 0x2)
r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, <r3=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000100)=0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r5, 0x5, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xf00, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0)
sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x68, r5, 0x100, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8080}, 0x4)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
close(0xffffffffffffffff)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c7465720000001f4b47f925bba7d652e1d35f00000000000000000000000000000000000000000000000e00000004000000d8030000e8010000f0000000e80100000916c36205a327c8df6f", @ANYPTR, @ANYBLOB], 0x3)

00:42:47 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

00:42:47 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

00:42:47 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
creat(0x0, 0x0)
socket$can_bcm(0x1d, 0x2, 0x2)
r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, <r3=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000100)=0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r5, 0x5, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xf00, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0)
sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x68, r5, 0x100, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8080}, 0x4)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
close(0xffffffffffffffff)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c7465720000001f4b47f925bba7d652e1d35f00000000000000000000000000000000000000000000000e00000004000000d8030000e8010000f0000000e80100000916c36205a327c8df6f", @ANYPTR, @ANYBLOB], 0x3)

00:42:47 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

00:42:47 executing program 3:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

00:42:47 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)={0x18, 0x32, 0x301, 0x0, 0x0, {0x3}, [@nested={0x4}]}, 0x18}}, 0x0)

[  180.425240][   T25] kauditd_printk_skb: 6 callbacks suppressed
[  180.425283][   T25] audit: type=1804 audit(1572050567.670:56): pid=7669 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir230427606/syzkaller.x8B6yW/5/bus" dev="sda1" ino=16561 res=1
00:42:47 executing program 3:
mkdirat(0xffffffffffffff9c, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe)
r1 = syz_open_procfs(0x0, 0x0)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000140))
r2 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000140))
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8)
r4 = getegid()
r5 = getpid()
r6 = getpgid(r5)
r7 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x0, 0x4, @tid=r7}, 0x0)
r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
gettid()
socket(0x1, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
r11 = getpid()
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802)
r12 = gettid()
timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r12}, 0x0)
r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r13, 0x0)
setgid(0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r14=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r14)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}, 0x0)
gettid()
timer_create(0x9, 0x0, 0x0)
r15 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fstat(r15, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
setgid(0x0)
gettid()
socket(0x1, 0x0, 0x0)
setreuid(0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100)}, 0x0)
sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000440)="c9064cc90b35c39fc61fcebd760195091ab15255dbf3edd16d022e14149189df953d6cfc033d389b7ac9b5008db30d3848434100d17dccee5daaec236af5a27452516ff05210e8df437525c3b021b30d193481426f78501676651a415a503b34014f366bc2e4cff95c21f782294fabb36e6b5fa2b18d5af2424971690afb1bfd5a8f562e59b91245fb07064f0e608b70fb5be66038607fe036e10356d0940bed24174c5b99665a0ee87af9449078a8ef30c9b1ca701934a55ea98b15ebf2a7b4e2d48a11c6c4e369b3edc46dd0076c19d85a1fae62f15f274826", 0xda}, {&(0x7f0000000540)}], 0x2, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="00000000100000000100000001000000010000001c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=r9, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=r11, @ANYRES32=r14, @ANYRES32=r16, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x74, 0x80}, 0x4000020)
r17 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(r17, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0)
r18 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0)
sendfile(r17, r18, 0x0, 0x8000fffffffe)
creat(&(0x7f0000000800)='./bus\x00', 0x100000010)

00:42:48 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)={0x18, 0x32, 0x301, 0x0, 0x0, {0x3}, [@nested={0x4}]}, 0x18}}, 0x0)

00:42:48 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

00:42:48 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
creat(0x0, 0x0)
socket$can_bcm(0x1d, 0x2, 0x2)
r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, <r3=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000100)=0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r5, 0x5, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xf00, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0)
sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x68, r5, 0x100, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8080}, 0x4)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
close(0xffffffffffffffff)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c7465720000001f4b47f925bba7d652e1d35f00000000000000000000000000000000000000000000000e00000004000000d8030000e8010000f0000000e80100000916c36205a327c8df6f", @ANYPTR, @ANYBLOB], 0x3)

00:42:48 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

[  181.043047][   T25] audit: type=1804 audit(1572050568.290:57): pid=7699 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir230427606/syzkaller.x8B6yW/6/bus" dev="sda1" ino=16554 res=1
00:42:48 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

[  181.248436][   T25] audit: type=1804 audit(1572050568.430:58): pid=7711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir230427606/syzkaller.x8B6yW/6/bus" dev="sda1" ino=16554 res=1
00:42:48 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)={0x18, 0x32, 0x301, 0x0, 0x0, {0x3}, [@nested={0x4}]}, 0x18}}, 0x0)

00:42:49 executing program 0:
r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00')
mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20000008)
add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe)
r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
renameat2(r1, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x2)

00:42:49 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

00:42:49 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)={0x18, 0x32, 0x301, 0x0, 0x0, {0x3}, [@nested={0x4}]}, 0x18}}, 0x0)

00:42:49 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

00:42:49 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe80000000000000000000", @ANYRES32=0x41424344, @ANYBLOB="58000000a100b41d7c9620faaf"], 0x0)
getpid()
pipe(0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x2c, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d5902670800223ec75b4e1a9ae934c8f49b21f35c01", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x21, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getpid()
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@ipv4, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, 0x0)
syz_mount_image$jfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000200)="939dca2bd1ab3ba735fd2dce4e", 0xd, 0x7}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{0x0}, {&(0x7f00000003c0)}, {0x0}], 0x4, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(r3)
openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40)
r4 = getpid()
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0)
write$vhci(r5, 0x0, 0x0)
r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r6, r5)
kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r6, 0x0)
syz_open_dev$audion(&(0x7f0000002400)='/dev/audio#\x00', 0x5425995d, 0x800)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r7, 0x1000008912, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, 0x0, 0x0)
syz_mount_image$jfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x4, &(0x7f0000000b00)={[{@discard_size={'discard'}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@obj_type={'obj_type', 0x3d, '|'}}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getgroups(0x1, &(0x7f0000000580)=[0x0])
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
dup(0xffffffffffffffff)
getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, 0x0, &(0x7f00000005c0))
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
socket$key(0xf, 0x3, 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

00:42:49 executing program 3:
r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x802)
ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0})

00:42:49 executing program 0:
r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00')
mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20000008)
add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe)
r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
renameat2(r1, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x2)

00:42:49 executing program 5:
r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00')
mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20000008)
add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe)
r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
renameat2(r1, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x2)

[  182.360396][ T7781] usb usb7: check_ctrlrecip: process 7781 (syz-executor.3) requesting ep 01 but needs 81
[  182.370737][ T7781] usb usb7: usbfs: process 7781 (syz-executor.3) did not claim interface 0 before use
00:42:49 executing program 3:
r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x802)
ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0})

00:42:50 executing program 0:
r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00')
mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20000008)
add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe)
r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
renameat2(r1, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x2)

00:42:50 executing program 5:
r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00')
mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20000008)
add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe)
r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
renameat2(r1, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000000)='./file0\x00', 0x2)

00:42:50 executing program 2:
r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x802)
ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0})

[  182.837777][ T7805] usb usb7: check_ctrlrecip: process 7805 (syz-executor.3) requesting ep 01 but needs 81
[  182.877792][ T7805] usb usb7: usbfs: process 7805 (syz-executor.3) did not claim interface 0 before use
[  182.899094][ T7231] ==================================================================
[  182.907191][ T7231] BUG: KCSAN: data-race in osq_lock / osq_lock
[  182.913318][ T7231] 
[  182.915638][ T7231] write to 0xffff88812be2b054 of 4 bytes by task 7803 on cpu 0:
[  182.923267][ T7231]  osq_lock+0x89/0x2f0
[  182.928031][ T7231]  rwsem_optimistic_spin+0x5f/0x320
[  182.933227][ T7231]  rwsem_down_write_slowpath+0x109/0x950
[  182.938856][ T7231]  down_write+0x88/0x90
[  182.943006][ T7231]  unlink_anon_vmas+0x13a/0x4b0
[  182.947858][ T7231]  free_pgtables+0x147/0x200
[  182.952458][ T7231]  exit_mmap+0x151/0x300
[  182.956699][ T7231]  mmput+0xea/0x280
[  182.960509][ T7231]  flush_old_exec+0x655/0xfd0
[  182.965184][ T7231]  load_elf_binary+0x69a/0x2ec0
[  182.970027][ T7231]  search_binary_handler+0x127/0x420
[  182.975393][ T7231]  __do_execve_file.isra.0+0xb76/0x11d0
[  182.980926][ T7231]  __x64_sys_execve+0x62/0x80
[  182.985596][ T7231]  do_syscall_64+0xcc/0x370
[  182.990077][ T7231] 
[  182.992401][ T7231] read to 0xffff88812be2b054 of 4 bytes by task 7231 on cpu 1:
[  182.999970][ T7231]  osq_lock+0x170/0x2f0
[  183.004125][ T7231]  rwsem_optimistic_spin+0x5f/0x320
[  183.009318][ T7231]  rwsem_down_write_slowpath+0x109/0x950
[  183.014965][ T7231]  down_write+0x88/0x90
[  183.019121][ T7231]  anon_vma_fork+0x1e7/0x280
[  183.023707][ T7231]  dup_mm+0x71e/0xba0
[  183.027683][ T7231]  copy_process+0x36f3/0x3b50
[  183.032349][ T7231]  _do_fork+0xfe/0x6e0
[  183.036416][ T7231]  __x64_sys_clone+0x12b/0x160
[  183.041179][ T7231]  do_syscall_64+0xcc/0x370
[  183.045679][ T7231]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  183.051557][ T7231] 
[  183.053877][ T7231] Reported by Kernel Concurrency Sanitizer on:
[  183.060026][ T7231] CPU: 1 PID: 7231 Comm: udevd Not tainted 5.4.0-rc3+ #0
[  183.067034][ T7231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  183.077107][ T7231] ==================================================================
[  183.085162][ T7231] Kernel panic - not syncing: panic_on_warn set ...
[  183.091742][ T7231] CPU: 1 PID: 7231 Comm: udevd Not tainted 5.4.0-rc3+ #0
[  183.098754][ T7231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  183.108805][ T7231] Call Trace:
[  183.112100][ T7231]  dump_stack+0xf5/0x159
[  183.116342][ T7231]  panic+0x210/0x640
[  183.120263][ T7231]  ? __x64_sys_clone+0x12b/0x160
[  183.125208][ T7231]  ? vprintk_func+0x8d/0x140
[  183.129802][ T7231]  kcsan_report.cold+0xc/0x10
[  183.134490][ T7231]  __kcsan_setup_watchpoint+0x32e/0x4a0
[  183.140041][ T7231]  __tsan_read4+0x2c/0x30
[  183.144370][ T7231]  osq_lock+0x170/0x2f0
[  183.148525][ T7231]  rwsem_optimistic_spin+0x5f/0x320
[  183.153728][ T7231]  rwsem_down_write_slowpath+0x109/0x950
[  183.159360][ T7231]  ? __tsan_write4+0x32/0x40
[  183.163954][ T7231]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[  183.169602][ T7231]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[  183.175238][ T7231]  ? __tsan_read8+0x2c/0x30
[  183.179740][ T7231]  ? memcg_kmem_put_cache+0x91/0xe0
[  183.184938][ T7231]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[  183.190572][ T7231]  down_write+0x88/0x90
[  183.194730][ T7231]  anon_vma_fork+0x1e7/0x280
[  183.199330][ T7231]  dup_mm+0x71e/0xba0
[  183.203331][ T7231]  copy_process+0x36f3/0x3b50
[  183.208012][ T7231]  ? __sanitizer_cov_trace_switch+0x49/0x80
[  183.213920][ T7231]  _do_fork+0xfe/0x6e0
[  183.217988][ T7231]  ? __write_once_size+0x41/0xe0
[  183.222946][ T7231]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[  183.225265][ T7812] usb usb7: check_ctrlrecip: process 7812 (syz-executor.2) requesting ep 01 but needs 81
[  183.228578][ T7231]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[  183.228596][ T7231]  ? __fd_install+0x117/0x230
[  183.228619][ T7231]  __x64_sys_clone+0x12b/0x160
[  183.228642][ T7231]  do_syscall_64+0xcc/0x370
[  183.228672][ T7231]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  183.263825][ T7231] RIP: 0033:0x7f36a02aff46
[  183.268240][ T7231] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 14 25 10 00 00 00 31 d2 49 81 c2 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 31 01 00 00 85 c0 41 89 c4 0f 85 3b 01 00
[  183.288102][ T7231] RSP: 002b:00007fffe4d35f60 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[  183.288866][ T7812] usb usb7: usbfs: process 7812 (syz-executor.2) did not claim interface 0 before use
[  183.296509][ T7231] RAX: ffffffffffffffda RBX: 00007fffe4d35f60 RCX: 00007f36a02aff46
[  183.296519][ T7231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
[  183.296528][ T7231] RBP: 00007fffe4d35fc0 R08: 0000000000001c3f R09: 0000000000001c3f
[  183.296537][ T7231] R10: 00007f36a0bcca70 R11: 0000000000000246 R12: 0000000000000000
[  183.296545][ T7231] R13: 00007fffe4d35f80 R14: 0000000000000005 R15: 0000000000000005
[  183.297846][ T7231] Kernel Offset: disabled
[  183.351402][ T7231] Rebooting in 86400 seconds..