: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x201000) setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000340), 0x1, 0x3) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$VIDIOC_S_EDID(r4, 0xc0285629, &(0x7f0000000280)={0x0, 0x3, 0x2, [], &(0x7f0000000240)=0x8}) sendmsg$nl_netfilter(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x42000008}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000030400b6c910284ddb55bca81b2cbd7000fd9076df5e02dbdf25030000"], 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x854) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket$inet(0x10, 0x2, 0x4) sendmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="240000005e0007041dfffd946f610500070000001d00000077000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 18:50:46 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003200)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f0000001740)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB]}}], 0x2, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x0, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1}, 0x0) timer_create(0xfffffffffffffffd, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{}, {0x0, r1+30000000}}, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {r2}}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) connect(r3, &(0x7f0000000100)=@l2={0x1f, 0x1ff, {0x7, 0x8, 0x6, 0x1f, 0xe0, 0x68}, 0x200, 0x1}, 0x80) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2}, 0x10) stat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000300)) r4 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r4, &(0x7f0000000340)=""/128, 0x80) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 18:50:46 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(morus1280)\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$SG_GET_REQUEST_TABLE(r4, 0x2286, &(0x7f0000000240)) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000080)=0x7f) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) r6 = accept$ax25(r5, &(0x7f0000000000)={{0x3, @default}, [@rose, @rose, @default, @remote, @netrom, @bcast, @rose, @null]}, &(0x7f0000000180)=0x301ca8807cf4f415) ioctl$FICLONE(r3, 0x40049409, r6) 18:50:46 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 302.791955] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=94 sclass=netlink_tcpdiag_socket pig=12862 comm=syz-executor.3 18:50:46 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003200)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f0000001740)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB]}}], 0x2, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x0, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1}, 0x0) timer_create(0xfffffffffffffffd, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{}, {0x0, r1+30000000}}, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {r2}}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000300)) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) connect(r3, &(0x7f0000000100)=@l2={0x1f, 0x1ff, {0x7, 0x8, 0x6, 0x1f, 0xe0, 0x68}, 0x200, 0x1}, 0x80) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2}, 0x10) stat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000300)) r4 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r4, &(0x7f0000000340)=""/128, 0x80) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 302.865000] audit: type=1400 audit(1570387846.359:169): avc: denied { create } for pid=12865 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 18:50:46 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e20, @rand_addr=0xffffffff}, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e20, @local}, 0x8, 0x0, 0x0, 0x0, 0xd3, &(0x7f0000000000)='dummy0\x00', 0x4, 0x7fff, 0x2}) close(r0) 18:50:46 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:46 executing program 3: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x67, 0x402) r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xff, 0x0, 0x0, 0xfe, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef85951babb4cc28, @perf_bp={&(0x7f0000000000), 0x9}, 0x250, 0x2000000000000e41, 0x0, 0x9, 0x3}, r1, 0x5, r0, 0xe) fcntl$setpipe(r2, 0x407, 0x8b3) creat(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000480)='/dev/adsp#\x00', 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x0, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e22, 0x200, @local, 0x8}, {0xa, 0x4e21, 0x8, @loopback, 0x9}, 0x0, [0x3f, 0x6, 0xff, 0x1ff, 0xac29, 0x3f, 0x6, 0x1]}, 0x5c) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000280)={0x5, 0x20000005}, &(0x7f0000000340)={0x3ff}, 0x0, 0x0) 18:50:49 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x10000000) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000001300)=[{0x0}], 0x1, 0x10000000) write$vhci(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000004a80)={0x0, 0x0, 0x0}, &(0x7f0000004ac0)=0xc) keyctl$chown(0x4, 0x0, r3, r4) r5 = socket$inet6(0xa, 0x3, 0x1) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000004a80)={0x0, 0x0, 0x0}, &(0x7f0000004ac0)=0xc) keyctl$chown(0x4, 0x0, r6, r7) stat(&(0x7f00000000c0)='./file0/f.le.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$inet6(0xa, 0x3, 0x1) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000004a80)={0x0, 0x0, 0x0}, &(0x7f0000004ac0)=0xc) keyctl$chown(0x4, 0x0, r10, r11) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet6(0xa, 0x3, 0x1) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000004a80)={0x0, 0x0, 0x0}, &(0x7f0000004ac0)=0xc) keyctl$chown(0x4, 0x0, r14, r15) setgroups(0x7, &(0x7f0000000380)=[r4, r7, r8, 0xffffffffffffffff, r11, r12, r15]) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r16 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r16, &(0x7f0000000180)='.//ile0\x00', r16, &(0x7f00000007c0)='./file0/f.le.\x00') 18:50:49 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:50:49 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="9000000010003b2400"/20, @ANYRES32=0x0, @ANYBLOB="b56d08000000000008000a00", @ANYRES32=0x6, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = accept$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) getsockopt$inet_int(r2, 0x0, 0x6, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 18:50:49 executing program 1: socket$rxrpc(0x21, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6ad, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e24, @broadcast}}}, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKDIR(r1, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x0, 0xfffffffc, 0x5}}, 0x14) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x6) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000280)={0x1, 'bridge_slave_0\x00'}, 0x18) pipe(0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) 18:50:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x705, 0x70bd28, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0xfffffffffffffe65, 0xb, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r3}]]}}}]}, 0x4c}}, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = socket$inet(0x2, 0x803, 0x1) splice(r5, 0x0, r6, 0x0, 0x8001, 0x0) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r8, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x5, 0x0, 0xcecc, 0x40, 0x80000001, 0x7fffffff, 0x5, {r8, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x9, 0x3f, 0xf53}}, &(0x7f0000000500)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000080)={r8, 0x8e, 0xfff}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000002c0)={r8, @in6={{0xa, 0x4e22, 0x101, @mcast2, 0x8001}}, 0x4, 0x0, 0x200, 0x4, 0x1f}, &(0x7f0000000380)=0x98) r10 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0x400000) r11 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r11, 0x0, 0x0) lseek(r11, 0xfffffffffffffffe, 0x1) r12 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r11, 0x0, 0x0) lseek(r12, 0xfffffffffffffffa, 0x6) r13 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r13, 0x0, 0x0) lseek(r13, 0xfffffffffffffffe, 0x1) r14 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r14, 0x0, 0x0) lseek(r14, 0xfffffffffffffffe, 0x1) r15 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r15, 0x0, 0x0) lseek(r15, 0xfffffffffffffffe, 0x1) ioctl$FIDEDUPERANGE(r10, 0xc0189436, &(0x7f0000000580)={0xfffffffffffffffc, 0xff, 0x5, 0x0, 0x0, [{r11, 0x0, 0xcc9}, {r12, 0x0, 0x40}, {r13, 0x0, 0x8}, {r14, 0x0, 0x6133}, {r15, 0x0, 0xca63}]}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000003c0)={r9, 0x1}, &(0x7f0000000400)=0x8) [ 305.814324] device gre1 entered promiscuous mode [ 305.849590] audit: type=1400 audit(1570387849.339:170): avc: denied { associate } for pid=12904 comm="syz-executor.1" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 305.897261] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 18:50:49 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:49 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) keyctl$set_reqkey_keyring(0xe, 0x0) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 18:50:49 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:49 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0xc0ed0000, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x6, @loopback, 0x2}], 0x1c) 18:50:49 executing program 1: mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getgid() r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x4) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00', 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYRESHEX, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRES32, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32=r0], @ANYRESHEX=r4, @ANYRES16, @ANYRES32=0x0], @ANYBLOB="00007df8d17fa7f623ff420000000000000000d8bc9a6f467f", @ANYRES32=0x0, @ANYBLOB="003e3776cd010900000000000000a8d1001b20"], 0x5}}, 0x400c094) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 306.183493] audit: type=1400 audit(1570387849.679:171): avc: denied { map } for pid=12925 comm="syz-executor.1" path=2F6D656D66643A0B656D31C1F8A68D4EC0A35CE2CBA2BAE5F497AC232AFF202864656C6574656429 dev="tmpfs" ino=50752 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 306.258064] device gre1 entered promiscuous mode 18:50:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@cr4={0x1, 0x100040}], 0x1) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000080)={'team0\x00', r4}) r5 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x6, 0x200000) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000140)={r3}) 18:50:49 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 306.615508] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 18:50:52 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:50:52 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) acct(0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='GPL\x00', 0x4, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}}}, &(0x7f0000000200)=0xe8) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffff68, 0x200) r5 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) sendmsg$nl_netfilter(r4, &(0x7f00000007c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)={0x360, 0xb, 0x3, 0x9a6c559ac904fe25, 0x70bd2b, 0x25dfdbfb, {0xa, 0x0, 0x3}, [@typed={0x10, 0x8, @str='lonodev$\x00'}, @nested={0x31c, 0x55, [@typed={0x8, 0xd, @pid=r5}, @generic="40273eccf31ae7acfedca86a98490944da1d86755f2e958d2fb3608ffb844f9fd2e67ddbb78c610d3a27add5384530219e3bd277fc2c4acfd506189c9541c75fda13d9df", @generic="6679e231ebf5c1cad1ceb66a2ed96f8a375ce0946a1d9874829dd4b93802cabf83828816673dadd0127fdfd39894d55bd7a3ba980d95bd25e19398bd60c1bade062eaf92698da093cfff26ee6a78991ff543e10889847955a8e5bff6d91671c604595f00e4da83fdab25f771", @generic="5bb519feeb00cf4555367aff8e9330730a6183a4ad5e3d29f84861cee9d22110504ebf7eeef456981814d9df58128f34032c3fe9a408fcea0553591b6cea4ec26314a417f98640571a88277188386eea0b5859ac04", @generic="44f918050c3e96cea7d9fe04d21bb15be454da78c7536833ad30f6e02861b2491867a1227aee3897f36eb6a91cf9a5566c25d900514d9ea0064829c3d328337e26ef9456d987f1ec6b4502bcd0ccee6be61d26a919ff03aa7876c84d83c6dfd0e7f5aef41db15d7b1752b109bbd49370a3ee3ca97cc9a8366412cffac21221b542a4fbe52792a14a1c76bcd777654d4bb84d0a8e2382fae3a85f8005577871ab9857edfb4243de39737a37efa3c6a15da35ac4ce117712346720a2af3f57ecae5a9e49dea937cacc301afb2a0785e7bdabee4aa735a672e42e7042d50cedd93dca1beea81d6e59", @typed={0x4, 0x1b}, @generic="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", @generic="8018491ae8ad2239e8b97f11ea921438b2307f9775712cb7dcf6190103828de8"]}, @nested={0x20, 0x83, [@typed={0x14, 0x6c, @ipv6=@rand_addr="b4efa5096968b970cf3e9763a1e9b5ba"}, @typed={0x8, 0x51, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}}]}]}, 0x360}, 0x1, 0x0, 0x0, 0x2}, 0x8c001) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x8, 0x16, &(0x7f0000000400)=ANY=[@ANYPTR64, @ANYRESHEX=r3, @ANYBLOB="40e9f7784af54b24cc2bb29a28b70960a74ca65ceb7ff2197d8a"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x282, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x0, 0x100000}, 0xe7, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x242}, 0x1ad) exit(0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) 18:50:52 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0xfc, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RELDISP(r0, 0x5605) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x5}}, 0x18) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000) ppoll(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) r3 = socket$key(0xf, 0x3, 0x2) splice(r1, 0x0, r3, 0x0, 0x1000000000000006, 0x0) inotify_init1(0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) setsockopt$inet6_mtu(r4, 0x29, 0x17, 0x0, 0xffffffffffffff15) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r5 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r5) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 18:50:52 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:52 executing program 1: socket(0x1, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x3, 0x1, [], 0xa, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000040)=""/1}, &(0x7f0000000080)=0x78) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 18:50:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0xbac41bc70055f75d) sendmsg$nl_xfrm(r0, &(0x7f00007d9fc8)={0x0, 0x0, &(0x7f0000a40000)={&(0x7f0000b9e000)=ANY=[@ANYBLOB="b8000000210011040000000000000000e0000001000000000000000000000000ff010000000000000000000000000001000400"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005c00110000000000000000000000000000000001e000000200000000000000000000000000000000000000000000000000000000000000000000ffffac1c0101ff0100000000000000000000000000010000000000000000000000000c0010000000000000000000"], 0xb8}}, 0x0) 18:50:52 executing program 4: sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="14bdabe85cee127062d9e3bf3d9dc453"], 0x1}}, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3, 0x40001) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x850}, 0x4000010) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000001540)='/dev/vcsa#\x00', 0x8000, 0x40000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000001580)={'icmp6\x00'}, &(0x7f00000015c0)=0x1e) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000240)=0xf6, &(0x7f00000002c0)=0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000500)={0x0, 0xfb, 0x1015, 0x7, 0x40, "13f3494c4d114cbf2494957fec1bfec2", "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"}, 0x1015, 0x2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x80, 0x0) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f00000003c0)=""/237) 18:50:52 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 308.993419] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 309.008596] EXT4-fs (loop4): failed to parse options in superblock:  18:50:52 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 309.046520] EXT4-fs (loop4): Number of reserved GDT blocks insanely large: 21444 18:50:52 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x81, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) getrandom(&(0x7f0000000000)=""/127, 0x7f, 0x2) 18:50:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x800, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x8400, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x200000, 0x0) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r8, 0x0, 0x0) lseek(r8, 0xfffffffffffffffe, 0x1) r9 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r9, 0x0, 0x0) lseek(r9, 0xfffffffffffffffe, 0x1) getdents64(r9, 0x0, 0xfffffffffffffd56) lseek(r5, 0xfffffffffffffffe, 0x1) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x296, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="e048c427"], 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r10, 0x0, 0x0) lseek(r10, 0xfffffffffffffffe, 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r10, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000140)="c4c2795964b853c74424000c000000c744240258aaea93c7442406000000000f011c24460f017f00c441f171d4000f20c035100000000f22c065660fdcce66baf80cb82f12f48bef66bafc0cecc482a2f54700c4823107eec4a27921fd", 0x5d}], 0x1, 0x68, &(0x7f00000000c0), 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000040), 0xa) [ 309.123908] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 309.134877] EXT4-fs (loop4): failed to parse options in superblock:  [ 309.166010] EXT4-fs (loop4): Number of reserved GDT blocks insanely large: 21444 18:50:52 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:55 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:50:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x6c25}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000000c0)={r4, 0xfa4d, 0x20}, &(0x7f0000000300)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@polexpire={0xcc, 0x1b, 0x221, 0x0, 0x0, {{{@in6=@dev, @in=@empty}}}, [@mark={0xc}]}, 0xcc}, 0x8}, 0x0) 18:50:55 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="5b303a07fbff00404a7363af81f1277c00000000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1f, 0x8, "4a8595d9b010e9f6c97d56b0ac1a7b35e1c3b6c93c24531df8af0a48e4a0c5eedf4d869ee99fd7e5e9ecd34ece596d7f5597bbe25f2591397444a2e682f3040b", "0b66ddb87cc7aa8964174131db2d5424dd49491170efa455e8dca052331309e9", [0x10000000000, 0x702]}) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, 0x0) 18:50:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x4400) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x5, 0x10, 0x1, 0x9bdd}, &(0x7f0000000240)=0x18) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'dummy0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast1, @local}, &(0x7f0000000400)=0xc) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x7, 0x2, &(0x7f0000000340)=[{&(0x7f0000000300)="2190af92167234311bf38908ce96e6be6254870b1a", 0x15, 0x214}, {&(0x7f0000001480)="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", 0x1000, 0x800}], 0x2a80000, &(0x7f0000000440)={[{@filestreams='filestreams'}, {@logbufs={'logbufs', 0x3d, 0xffffffffffffffff}}, {@uqnoenforce='uqnoenforce'}, {@qnoenforce='qnoenforce'}, {@lazytime='lazytime'}], [{@appraise_type='appraise_type=imasig'}]}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in=@broadcast, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xffffffc5) 18:50:55 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = dup2(r1, r2) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f00000000c0)={0x3, 0xc7, "855a610deb609bbaa0e88d5a43462f43a273c00ee3e11bba53469031e7c40a040ae14f68fa5fae4017488a16e754a063a9a551e251e3ba1584720f41b41c0258e513489c2c39077f6f966e853faaa0afd198f68cfa9c4d8acd61e8edb49f2f29652f5303136bc46e7c3b1f653a34428d1e5c47a09a4524fc9c35e5167c7191199bb1f3554482e8c43e90f79cc44cb229460446f78b3fd5ec0d51401abc79e6ebbf643d856a536e9e0b4352670655bed82a87b5a2155adf794b1f0190a69d1418a3de09d58f4a02"}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 311.919986] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 311.920584] ceph: device name is missing path (no : separator in [0:ûÿ) [ 311.958567] ceph: device name is missing path (no : separator in [0:ûÿ) 18:50:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() tkill(0x0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x401, 0x0, 0xfffffffffffffffd}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r5, 0x8001) sendfile(r5, r5, 0x0, 0x2008000fffffffe) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x800, 0x0) ioctl$EVIOCSABS0(r6, 0x401845c0, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="e66400", @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) dup3(r7, r8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x1c) [ 312.042705] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 312.162476] devpts: called with bogus options 18:50:56 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:56 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3884, 0x41280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x2) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) socket(0xa, 0x0, 0x0) socket(0x1000000010, 0x400000400080803, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) r5 = socket(0x1000000010, 0x400000400080803, 0x0) write(r5, &(0x7f0000000240)="240000001a0025f07e9451f68f2e9c920a0b49ffed000019806028000800100001000000", 0x24) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, 0x0, 0x0) 18:50:56 executing program 3: r0 = dup(0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000001c0)=@routing={0x21, 0x12, 0x0, 0x3, 0x0, [@rand_addr="fbf5b7e2c559882911d65d5c20438a6c", @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x1e}, @remote, @local, @ipv4={[], [], @loopback}, @dev={0xfe, 0x80, [], 0x23}, @empty]}, 0x98) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x800, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r4 = socket$inet(0x2, 0x803, 0x1) splice(r3, 0x0, r4, 0x0, 0x8001, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r6, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x5, 0x0, 0xcecc, 0x40, 0x80000001, 0x7fffffff, 0x5, {r6, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x9, 0x3f, 0xf53}}, &(0x7f0000000500)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000080)={r6, 0x8e, 0xfff}, 0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000480)={r6, @in={{0x2, 0x4e24, @multicast1}}}, 0x84) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) ftruncate(0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000180)=""/19, 0xfffffe47) bind$alg(0xffffffffffffffff, 0x0, 0x0) r7 = dup(0xffffffffffffffff) read$rfkill(0xffffffffffffffff, &(0x7f00000000c0), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) r9 = dup3(0xffffffffffffffff, r8, 0x0) ioctl$TCXONC(r9, 0x540a, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000380)=""/111, 0x6f}], 0x2, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_CREATE(r7, 0x5501) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r7, 0x5387, &(0x7f0000000000)) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000440)=0x1c) 18:50:56 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00@\x00\b', @ANYRES32=0x0], &(0x7f00000000c0)=0x8) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) r5 = socket$inet(0x2, 0x803, 0x1) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x8001, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r8, 0x0, 0x0) lseek(r8, 0xfffffffffffffffe, 0x1) openat(r8, &(0x7f0000000280)='./file0\x00', 0x0, 0x205) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r7, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x5, 0x0, 0xcecc, 0x40, 0x80000001, 0x7fffffff, 0x5, {r7, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x9, 0x3f, 0xf53}}, &(0x7f0000000500)=0xb0) sendto$unix(0xffffffffffffffff, &(0x7f0000000240)="1e2d88a92fa8d05acee58ea2f306de1ba69a6b1c9448e7713f424df9483f9e9bd13fc41c9d52180ee96804a3c77d2b85df", 0x31, 0x10008008, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={r7, 0x8e, 0xfff}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000000)={r7, 0x5}, &(0x7f0000000040)=0x8) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000480)=0x10) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/user\x00', 0x2, 0x0) [ 312.984554] devpts: called with bogus options 18:50:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") keyctl$session_to_parent(0x12) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x7a602445) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write(r0, &(0x7f0000001400)="83", 0x1) 18:50:58 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:58 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:50:58 executing program 0: gettid() msgctl$MSG_INFO(0x0, 0xc, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000300)=""/213, 0xd5}, {&(0x7f0000000580)=""/108, 0x6c}], 0x2) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000380)=""/113, 0x71, 0x2000, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000780)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}}}, 0x20) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000700)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @rand_addr=0x5}, 0x20, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x5, 0x2}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e23, 0x1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xb9}, r1}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r2 = syz_open_dev$sndpcmc(&(0x7f0000000840)='/dev/snd/pcmC#D#c\x00', 0x0, 0x8000) sendto$isdn(r2, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x22, 0x1, 0x7, 0x1f, 0x5}, 0x6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000002c0)={0x20}, 0x4) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000280)) r5 = openat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x80000, 0x2) setsockopt$inet_group_source_req(r5, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x38d00c92cff06ac5, &(0x7f0000000140)=""/170, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000004c0)={{0x0, @remote, 0x4e22, 0x0, 'wlc\x00', 0x1, 0x6, 0x39}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x0, 0x7fc00000, 0x1, 0x7fffffff}}, 0x44) ioctl$BLKTRACETEARDOWN(r6, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) r7 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x6, 0x0) getsockopt$bt_BT_FLUSHABLE(r7, 0x112, 0x8, &(0x7f0000000540)=0x9, &(0x7f0000000680)=0x4) 18:50:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r3 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/access\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r4, 0x8040ae9f, &(0x7f0000000140)) 18:50:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r2 = syz_open_procfs(0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) r3 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x1, 0x400000) syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={0x0}}, 0x8800) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000440)={0x90, 0x0, 0x7, {0x5, 0x3, 0x0, 0x9b7c, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9, 0x4, 0x0, 0x6, 0x3, 0x3, 0x0, 0x0, 0x0, 0x3, 0x7ff}}}, 0x90) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x12000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r5, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x6a) setsockopt$inet_tcp_int(r5, 0x6, 0x4000000000014, &(0x7f0000001680)=0x80000000001, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r7 = socket$inet(0x2, 0x803, 0x1) splice(r6, 0x0, r7, 0x0, 0x8001, 0x0) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="010026c3", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r9, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r8, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x5, 0x0, 0xcecc, 0x40, 0x80000001, 0x7fffffff, 0x5, {r9, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x9, 0x3f, 0xf53}}, &(0x7f0000000500)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000080)={r9, 0x8e, 0xfff}, 0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180)={r9, 0x3, 0x7fff, 0xc5}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000002c0)={r10}, &(0x7f0000000340)=0x8) r11 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) write$P9_RREMOVE(r11, &(0x7f00000000c0)={0xffffffffffffff7f}, 0xffdc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 18:50:58 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0xb99aa4d395afa97f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newqdisc={0x4c, 0x24, 0x507, 0x3, 0x0, {0x0, r5, {}, {0xfff3, 0xffff}, {0x14}}, [@qdisc_kind_options=@q_netem={{0xc, 0x1, 'netem\x00'}, {0x1c, 0x2, {{0x1b84, 0x0, 0x0, 0x8}}}}]}, 0x4c}}, 0x4000) 18:50:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000540)={'tunl0\x00', 0x0}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000100)=0x54) recvmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0}}], 0x8b, 0x2, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0xc) [ 315.259979] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:50:58 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x4}, 0x50}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x4) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdiO=./file0,louerdir=./file1,workdir=./file1']) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x3d858da3f9ee2d59}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000200)={0x9, 0x108, 0xfa00, {r3, 0x8f, "5fcb69", "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"}}, 0x110) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0x81) 18:50:58 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x800007fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="24000000100007031dfffd946fa2830020200a0009000100000000010000aba20400ff7e", 0x24}], 0x1}, 0x0) [ 315.437177] overlayfs: unrecognized mount option "upperdiO=./file0" or missing value [ 315.447171] libceph: parse_ips bad ip '[d::]»N½u0' [ 315.453459] audit: type=1400 audit(1570387858.949:172): avc: denied { write } for pid=13128 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 18:50:59 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:50:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r4 = socket$inet(0x2, 0x803, 0x1) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3f) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$cont(0x9, r5, 0x0, 0x28) r6 = getpgid(r5) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f0000001540)={0x2, 0x70, 0x0, 0x6d, 0x11, 0x1, 0x0, 0x0, 0x420, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x7}, 0x10085, 0x4, 0x5c, 0x0, 0xe3, 0x4, 0x53a1}, r6, 0xd, r7, 0x1) splice(r3, 0x0, r4, 0x0, 0x8001, 0x0) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r9, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r8, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x5, 0x0, 0xcecc, 0x40, 0x80000001, 0x7fffffff, 0x5, {r9, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x9, 0x3f, 0xf53}}, &(0x7f0000000500)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000080)={r9, 0x8e, 0xfff}, 0x8) recvfrom$unix(r1, &(0x7f0000000380)=""/187, 0xbb, 0x14000, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={r9, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e21, @rand_addr=0x4}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r10, 0x1, 0xcc, 0x6, 0x49, 0x7}, &(0x7f0000000180)=0x14) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="7f455c410600010005010d4da5921d751890fe532e3f"], 0x16) r11 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCSMASK(r11, 0x40104593, &(0x7f0000000240)={0x3, 0x1000, &(0x7f0000000540)="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"}) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 315.487003] overlayfs: unrecognized mount option "upperdiO=./file0" or missing value [ 315.526135] libceph: parse_ips bad ip '[d::]»N½u0' 18:50:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x101500, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x7) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x600000, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x3, 0x80) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4021fc) 18:50:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = dup3(r2, r4, 0x0) ioctl$KVM_SET_SREGS(r5, 0x4040aea0, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) dup2(r6, r5) [ 315.709474] sp0: Synchronizing with TNC [ 315.779516] sp0: Synchronizing with TNC 18:51:01 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:01 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {}, {}, 0xffffffff, 0x0, 0x1}, {{@in=@loopback, 0x20, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) syz_open_procfs(0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/create\x00', 0x2, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 18:51:01 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)='./file1/file0\x00') socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x1) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) link(&(0x7f00000001c0)='./file1/file0\x00', &(0x7f0000000240)='./file2\x00') lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file1/file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x2000, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="6d657461636f70793d6f6e2c696e646578396f66662c64656661756c745f7065726d697333a356713d2773696f6e732c6e66735f6558706f72743d6f66662c6e4a735f6578706f72743d6f66662c704a72a34a855bae04168b806d69745f646972586374696f2c6f626a6f7c515fe97c019a5f757365733d2f6465762f6c6f6f"]) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000a40)=ANY=[@ANYBLOB="010000003f000000fcffffff0000050001000000000000004477674520ed72d0f336184779133cbd7d616c77a1839f65302ce79c123bf9a07ce2b33d0534b797e9948a17394a593b896162216997586967cbe7f945b218a8679ef5a55e42eca0ad24a23978237b719f0f0c9bbfef8c6edecd94b206d0fc02646963ad20cc0c5fb27aefd6f51db2264092c7352c6f15fbe235312f11a3"]) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "00837df584149dd66046b9bf5c24ba8335dcaaa39e1242379986767772bac23858bf0c686c97d4499bb78ed164fd4982e9bcc3252302766b55491d0aac06d8a2c71480838bc73e572090b184426f5db34a3a22497854f642804d235dec4262590657c775533b7652245bd1bf66c84e6354b02b03521caf57e23023d137f5ac877b75cff11bf3f8fa0dab0d68d2bb9452deabe98aeb86d9218dcf29eac7ffea48d44f52f9a0634f6d6bd4a49edafc20c2394ffcaff12abd6693bfcfbacb2be610ed2e22ee72ec37645a00ee2d9aa80cb518fa65f26809cd1814d3980a39f93fc7ccc8f184a5370041c3976df9c83aa566a0fcc85e815b2026fa93800993ad65bf", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) 18:51:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{&(0x7f00000001c0)="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", 0x1fd, 0x3}, {&(0x7f0000001400)='XFSB', 0x4}], 0x0, 0xfffffffffffffffe) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000080)=0x1) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.origin\x00', &(0x7f0000000140)='\x9d*+%selinuxem0%eth0\x00', 0x14, 0x2) 18:51:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000014000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0xf, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 18:51:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000500)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x65, 0xffff, 0x8, 0x8, '9P2000.u'}, 0x15) write$cgroup_int(r3, &(0x7f0000000140), 0xffffff35) creat(&(0x7f0000000700)='./bus\x00', 0x88) r4 = request_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='vfat\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r4) 18:51:01 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:01 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x8, 0x220080) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=@newqdisc={0x444, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x284, 0x1, 'cbq\x00'}, {0x418, 0x2, [@TCA_CBQ_RTAB={0x404}, @TCA_CBQ_FOPT={0x10}]}}]}, 0x444}}, 0x0) 18:51:01 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e26, 0x10000, @mcast2}, 0x2b4) listen(r0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080)=0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x7, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000000)=0x3ff, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x5, 0x4) listen(r2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000e11ff0)=[{&(0x7f00000001c0)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00"/88, 0x58}], 0x1) 18:51:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x42) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) mremap(&(0x7f0000268000/0x1000)=nil, 0x1000, 0x1000, 0x4, &(0x7f0000287000/0x1000)=nil) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f00000000c0), 0xfffffffffffffe30) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) bind$inet6(r0, 0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/create\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYRES32], 0xfec0) r5 = dup2(r4, r3) r6 = accept4(r5, 0x0, 0x0, 0x800) splice(r6, 0x0, r2, 0x0, 0x7fffffff, 0x0) bind$tipc(r6, 0x0, 0x0) socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) clock_settime(0x1, &(0x7f00000001c0)={0x0, 0x989680}) writev(r7, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea11020000050000", 0x28}], 0x1) 18:51:02 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:02 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 318.651364] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 320.712822] audit: type=1400 audit(1570387864.209:173): avc: denied { map } for pid=13258 comm="syz-executor.3" path="/root/syz-executor.3" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 320.738833] audit: type=1400 audit(1570387864.209:174): avc: denied { map } for pid=13258 comm="syz-executor.3" path="/sys/kernel/debug/kcov" dev="debugfs" ino=25 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 321.031392] IPVS: ftp: loaded support on port[0] = 21 [ 321.847419] chnl_net:caif_netlink_parms(): no params data found [ 321.890798] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.897209] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.904604] device bridge_slave_0 entered promiscuous mode [ 321.913106] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.919529] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.927123] device bridge_slave_1 entered promiscuous mode [ 321.948742] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 321.958438] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 321.983647] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 321.991229] team0: Port device team_slave_0 added [ 321.996943] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 322.004275] team0: Port device team_slave_1 added [ 322.009771] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 322.017439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 322.082912] device hsr_slave_0 entered promiscuous mode [ 322.120423] device hsr_slave_1 entered promiscuous mode [ 322.160565] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 322.167531] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 322.183172] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.189557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.196219] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.202593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.237390] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 322.243778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.253030] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 322.262846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.271226] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.278207] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.288545] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 322.295300] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.305123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.313323] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.319660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.332031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.339690] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.346131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.361926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 322.369682] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.383861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.394895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.405894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.415358] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 322.422167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.436092] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 322.449769] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.830501] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 18:51:07 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:07 executing program 4: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0xffffffffffffffc9) shutdown(r3, 0x400000000000002) 18:51:07 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0xc0a, r0) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='com.apple.system.Security\x00', &(0x7f0000000280)='\x00', 0x1, 0x3) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000000700000027000000000001009500000000000000e239debee2a7c509999f01e1228d8c8f2eff96c827013324a68c437c14775dab8007be6502137973f590bf6fadfd9248a27f89615f91558781e4535308a608ee11"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r2 = syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x5, 0x80000) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000200)={0x400, 0x1}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f00000002c0)={0x8001008, 0xb325}) 18:51:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet(0x2, 0x840000000003, 0x2) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0xf81c98f464026a12, 0x10) open$dir(0x0, 0x200, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001880), 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="ff5b7213f6012f66b000000000e00200ffffffff816f00000000d7e81ad471"], 0x1f) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r3, 0x1) [ 323.805376] overlayfs: unrecognized mount option "metacopy=on" or missing value [ 323.829801] overlayfs: filesystem on './file0' not supported as upperdir [ 323.834878] overlayfs: unrecognized mount option "metacopy=on" or missing value 18:51:07 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) memfd_create(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0xc05c6104, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) creat(0x0, 0x0) r1 = getpid() timer_create(0x7, &(0x7f0000000100)={0x0, 0x0, 0x6, @tid=r1}, 0x0) clock_gettime(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000000c0)) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000000)=0x9b58) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x83b2f476773c9c96) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, 0x0) socket$inet6(0xa, 0x0, 0x0) clock_gettime(0x0, 0x0) clock_gettime(0x0, 0x0) timer_create(0x0, &(0x7f0000000280), 0x0) timer_settime(0x0, 0xfd3e0641d550746a, 0x0, 0x0) acct(0x0) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 18:51:07 executing program 4: socket$inet(0x2, 0x3, 0x0) socket$inet(0x2, 0x3, 0x7) memfd_create(0x0, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000000c0)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100}, 0x0) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x2, 0x20080) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) dup(0xffffffffffffffff) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 18:51:07 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:07 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0xc0a, r0) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='com.apple.system.Security\x00', &(0x7f0000000280)='\x00', 0x1, 0x3) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000000700000027000000000001009500000000000000e239debee2a7c509999f01e1228d8c8f2eff96c827013324a68c437c14775dab8007be6502137973f590bf6fadfd9248a27f89615f91558781e4535308a608ee11"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r2 = syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x5, 0x80000) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000200)={0x400, 0x1}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f00000002c0)={0x8001008, 0xb325}) 18:51:07 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:07 executing program 0: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10002, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000040)={0x1}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x6}, 0x10) socket$inet6(0xa, 0x9, 0x7fc) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x200, 0x0, 0x2}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000d80)="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", 0x481, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000940)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000100)=0x2) r4 = socket$inet6(0xa, 0x0, 0x0) accept4(r4, 0x0, &(0x7f0000000080), 0x80000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x500, 0x0, 0x102, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x91b) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000900), 0x800) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x500, 0x0, 0x102, 0x100000000000001}, 0x20) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x8004) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r5) socket$inet6_udplite(0xa, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x10000, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000440)={0x0, 0xe4, "27adba9d52471e30150d87f4833032db11a13172e1db5d73d3a4fbb1c11e8e5b27c1dd15563fbf8a518a9af19e843f73f64e05e22063e07e74bcc7d776c31705d515714d3867350aedb3f5779bcd552cb86741e4018edcbdb46acf1aff5afc436af9c914b655d0ec35dc6acd1b52e8da180704101293eb322648339b1f5a2233958f9cb77046051e799398159ade41c41643204ddc8203790df5977f52cdc7ba01a921613a6f808c4d94b13522fb409cb34d38ddb88aeefe294e13c4d0ee8ddfa665640c6d09b232bd7bc7e3c92f9500923399206e00a609167365920757ae8f3a0b27eb"}, &(0x7f0000000100)=0xec) 18:51:08 executing program 1: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$P9_RREAD(r0, &(0x7f0000000200)=ANY=[], 0x5aa78d33) lremovexattr(0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000640)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000180)={0x3, 0x0, 0x608, 0x401}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xb0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x141100, 0x0) write$P9_RWRITE(r1, &(0x7f00000000c0)={0xb, 0x77, 0x2, 0x5}, 0xb) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) accept4(r2, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) fallocate(r0, 0x10, 0x0, 0x10fffe) 18:51:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) memfd_create(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0xc05c6104, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) creat(0x0, 0x0) r1 = getpid() timer_create(0x7, &(0x7f0000000100)={0x0, 0x0, 0x6, @tid=r1}, 0x0) clock_gettime(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000000c0)) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000000)=0x9b58) open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x83b2f476773c9c96) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, 0x0) socket$inet6(0xa, 0x0, 0x0) clock_gettime(0x0, 0x0) clock_gettime(0x0, 0x0) timer_create(0x0, &(0x7f0000000280), 0x0) timer_settime(0x0, 0xfd3e0641d550746a, 0x0, 0x0) acct(0x0) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 324.857155] audit: type=1400 audit(1570387868.349:175): avc: denied { name_bind } for pid=13327 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:51:08 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = gettid() ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)={0x0, 0x0, @ioapic={0x6000, 0x3, 0x0, 0x62, 0x0, [{0xd2, 0x17, 0x4, [], 0x9}, {0x40, 0x86, 0xff, [], 0xff}, {0x0, 0x1, 0x6, [], 0x3}, {0xf8, 0x6, 0x0, [], 0x40}, {0x0, 0x81, 0x80, [], 0xff}, {0x7f, 0x6, 0x81, [], 0x3b}, {0x9, 0x40, 0x5, [], 0x7f}, {0x5, 0x5, 0x3f, [], 0xd2}, {0x5f, 0x6, 0x1, [], 0x1}, {0x40, 0x28, 0x1, [], 0x8}, {0x6, 0x9}, {0x25, 0xab, 0xf8, [], 0x2}, {0xff, 0x5, 0x7d, [], 0xff}, {0xc1, 0x0, 0x2, [], 0xc}, {0x5, 0x7f, 0x5, [], 0x7}, {0x40, 0x0, 0x0, [], 0x40}, {0x21, 0x5, 0x9, [], 0x3}, {0x81, 0x4, 0x3f, [], 0x81}, {0x20, 0x1f, 0x0, [], 0x8}, {0x81, 0x9, 0xfb, [], 0x7}, {0x0, 0x1, 0x5, [], 0x3}, {0x2, 0x87, 0x7, [], 0xff}, {0x0, 0x1, 0x9, [], 0xff}, {0x90, 0x5, 0x1f, [], 0xf9}]}}) recvmmsg(r1, &(0x7f0000003c00)=[{{0x0, 0x0, &(0x7f0000003b00), 0x0, &(0x7f0000000180)=""/106, 0x6a}}], 0x400000000000116, 0x0, &(0x7f0000000040)={0x77359400}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r1) write$FUSE_GETXATTR(r5, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup3(r0, r5, 0x0) tkill(r2, 0x1004000000013) 18:51:08 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) chdir(0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = getpgid(r0) rt_tgsigqueueinfo(r0, r4, 0x34, &(0x7f00000000c0)={0x3e, 0x6, 0x5}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r5, 0x28007d) sendfile(r5, r5, 0x0, 0x2008000fffffffe) open(&(0x7f0000000240)='./file0\x00', 0x42, 0x40) [ 325.254821] audit: type=1400 audit(1570387868.349:176): avc: denied { node_bind } for pid=13327 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 18:51:08 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:10 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:10 executing program 3: ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4d304, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) shmdt(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000200)={@multicast2, @loopback, 0x0, 0x1, [@multicast2]}, 0x14) r2 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x800) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000001fd8)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x70) close(0xffffffffffffffff) 18:51:10 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000001c0)={0x54, 0x80, 0x0, 0x0, 0x3, 0x102}) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000040)={0x0, [0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x10, 0x0, 0x2, 0xc84d, 0x0, 0x7fffffff, 0x0, 0x0, 0xfffffffffffffff9, 0x8, 0x68, 0x40, 0x8, 0x8000, 0xffffffff80000000, 0xf7, 0x65, 0x3132, 0x4, 0x38e, 0x101, 0x7ff, 0x0, 0x1, 0x0, 0x9, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf1, 0x2, 0x6, 0x0, 0x9, 0x9], 0x7}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000000)) ptrace$getenv(0x4201, r2, 0x4, &(0x7f0000000200)) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x10001) fallocate(r4, 0x20, 0x0, 0x7ff800000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000100)={0x4, 0xfff, 0x6}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r4, 0x8980, &(0x7f00000002c0)={'rose0\x00', 0xe000}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000240), &(0x7f0000000300)=0x4) open(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000004c0)={{0x2, 0x0, 0x5, 0x2}, 0x0, 0x0, 'id1\x00', 'timer1\x00', 0x0, 0xb22, 0x0, 0x2, 0xff}) socket$inet6(0xa, 0x3, 0x1) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r6 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r7 = syz_open_dev$char_usb(0xc, 0xb4, 0xf2) fchdir(r7) dup2(r6, r5) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) socket(0x10, 0x3, 0x0) 18:51:10 executing program 4: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/568]}, 0x2b0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) setsockopt$inet6_tcp_buf(r3, 0x6, 0xb, &(0x7f0000000040)="851d774350574965ca76f69091ba36692c7247803fe7eb6bb41847d32637be11d20f6583e4c5f20edc9a70f2ae3de5f26fa89f97", 0x34) ftruncate(r2, 0x200004) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x80001d00c0d0) [ 327.075256] x_tables: eb_tables: realm match: used from hooks POSTROUTING, but only valid from INPUT/FORWARD/OUTPUT/POSTROUTING 18:51:10 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 327.254845] x_tables: eb_tables: realm match: used from hooks POSTROUTING, but only valid from INPUT/FORWARD/OUTPUT/POSTROUTING 18:51:10 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, 0x0, &(0x7f0000000340)) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xfffffffffffffcd8) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x62) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r4}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x100, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xe0, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xd0, 0x2, [@IFLA_IPTUN_PMTUDISC={0x8, 0xa, 0x1}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @loopback}, @IFLA_IPTUN_PROTO={0x8}, @tunl_policy=[@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x3}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e21}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e24}, @IFLA_IPTUN_TTL={0x8, 0x4, 0x3f}], @IFLA_IPTUN_PMTUDISC={0x8, 0xa, 0x1}, @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e20}], @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x1}, @IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x2}, @IFLA_IPTUN_TTL={0x8, 0x4, 0x7f}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e23}, @IFLA_IPTUN_LINK={0x8, 0x2, r4}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x4}, @IFLA_IPTUN_TTL={0x8, 0x4, 0xff}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x29}, @IFLA_IPTUN_TTL={0x8, 0x4, 0x1}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x1f}, @IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x3}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @empty}]}}}]}, 0x100}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 18:51:10 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1, 0x203) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x1000000000400200) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[{0x5, 0x20, 0x2, 0x101}, {0x3ff, 0x7, 0x4, 0xfffffffb}, {0xffff, 0x4, 0x0, 0x7}, {0x9, 0x2, 0xc5, 0x1ff}, {0x3, 0x0, 0xfb, 0xe7f}, {0x0, 0xf9, 0x7, 0x5}, {0x8001, 0x1, 0xff, 0x7}]}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'bcsh0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}}) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x2000, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet(0x2, 0x803, 0x1) splice(r1, 0x0, r2, 0x0, 0x8001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x5, 0x0, 0xcecc, 0x40, 0x80000001, 0x7fffffff, 0x5, {r3, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x9, 0x3f, 0xf53}}, &(0x7f0000000500)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r3, 0x8e, 0xfff}, 0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e24, 0x40, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfff}}}, 0x84) 18:51:10 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x12f) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffee1, 0x100, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0xffffffffffffff86) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000000)="b863aefe50757cb5430b887d7a41095e52042b10d6f0be906682eaf94df13c770a920fc148f68963452bb6c77ef69eb002150c41e1a61610038f", 0xffffffffffffffbc, 0x0, 0x0, 0x0) 18:51:11 executing program 1: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = openat$userio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/userio\x00', 0x688400, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000140)={0x22, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e23, 0x3, 'ovf\x00', 0x20, 0xc0, 0x26}, 0x2c) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$RTC_WIE_ON(r4, 0x700f) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r6, &(0x7f0000000100)={0x0, 0xfddf, &(0x7f00000000c0)={&(0x7f0000000340)={0x14, r7, 0x701, 0x0, 0x0, {0x6, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r4, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2800a01}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e4, r7, 0x5c91e9dee7a38f9d, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9085}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x486}]}, @TIPC_NLA_BEARER={0x60, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xefe, @rand_addr="6dd2da310aa688707e5ab432b16edcbf", 0x3}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1e51}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffe00}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'nlmon0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x92f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vlan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040000) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000000ffff0066624082122c00ff0028000100000000000000000000b26dea2300000000000000000000000000000000007c8a16b429529df8b97e3f2fd5fc000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 18:51:11 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 328.081715] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:51:11 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 328.126421] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13423 comm=syz-executor.1 18:51:11 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x80, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000280)=0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000300)={{0x2, 0x4, 0x94, 0x4, 'syz1\x00', 0x101}, 0x4, 0x20, 0x6, r4, 0x4, 0xfffffffd, 'syz1\x00', &(0x7f00000002c0)=['md5sum\x00', '@,!!#vmnet1:%\x00', 'systemwlan1/}systemcpuset@wlan1}\x00', 'em0.\x00'], 0x3b, [], [0x4, 0x0, 0x9, 0x6]}) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000000c0)={{0x5, 0x40}, 0x0, 0x5, 0x92, {0x2, 0xc0}, 0x20, 0x74c}) r5 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r5, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 18:51:13 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:13 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:13 executing program 1: chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000540)=[{}, {}]}) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x72bdf1e6a0acecc1) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000100)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r4, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x0, 0x3}]) r5 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r5, 0x1000000000016) dup2(r2, r3) pivot_root(0x0, &(0x7f0000000440)='./file1/file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000840)=""/217, 0xd9}, {&(0x7f0000000a40)=""/148, 0x94}], 0x2}, 0x10001}, {{0x0, 0x0, &(0x7f0000002d80), 0x0, &(0x7f0000002e00)=""/178, 0xb2}, 0x3}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {&(0x7f0000003040)=""/30, 0x1e}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000004440)=""/2, 0x2}}, {{&(0x7f0000006940)=@alg, 0x80, 0x0}, 0xfffffffffffffffd}, {{0x0, 0x0, 0x0}}], 0x7, 0x1, &(0x7f0000008b40)) chdir(0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:51:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000740)=""/246) ioctl$PPPIOCSACTIVE(r4, 0x40107446, &(0x7f0000000140)={0x2c0}) 18:51:13 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) getsockopt$packet_buf(r2, 0x107, 0x1, &(0x7f0000000200)=""/197, &(0x7f0000000080)=0xc5) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x80) close(r0) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0xe1) 18:51:13 executing program 0: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f00000001c0)={{}, {r0, r1+10000000}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00 \x00\t\x04\x00\xe2\x03\x00', 0xd102}) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000ec0)=""/202, 0x200011b9}], 0x1, 0x0) dup2(r2, r3) r4 = gettid() tkill(r4, 0x1000000000016) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 18:51:13 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:13 executing program 4: gettid() msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000580)=""/108, 0x6c}], 0x2) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)='./file1/file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) link(0x0, &(0x7f0000000240)='./file2\x00') lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file1/file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) r1 = socket$nl_route(0x10, 0x3, 0x0) flock(r1, 0x3) mount$overlay(0x0, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="6d657461636f70793d6f6e2c696e646578396f66662c64656661756c745f7065726d697333a356713d2773696f6e732c6e66735f6558706f72743d6f66662c6e4a735f6578706f72743d6f66662c704a72a34a855bae04168b806d69745f646972586374696f2c6f626a6f7c515fe97c019a5f757365733d2f6465762f6c6f6f"]) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, &(0x7f0000000340)={0xb, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e23, 0xfffffffd, @ipv4={[], [], @broadcast}, 0x7fff}, r4}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0xfffffffffffffcf7) sendto$isdn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x22, 0x1, 0x7, 0x1f, 0x5}, 0x6) openat(0xffffffffffffffff, &(0x7f00000006c0)='./file2\x00', 0x80000, 0x2) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x38d00c92cff06ac5, &(0x7f0000000140)=""/170, 0x0) 18:51:13 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e21, 0x4, @ipv4={[], [], @local}}, {0xa, 0x4e24, 0x6, @empty, 0x2}, 0x7ff, [0x2, 0xc83d, 0x5, 0x1, 0xff, 0xcdc, 0x2, 0x9541]}, 0x5c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x79fd5e907791ac5e) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x4, &(0x7f0000001380)=[{&(0x7f0000000180)="ced73e487766d24cdf9972b6a44ea1d9cdaa4f4f4d69b990d24c5113b0f76cd90fd4aa20f4ec0090969eac5b78a498acf5c89bb971b2268578bc80e87151f7bd52392bf145198b4ff89b50225c00b6066b9765d48c5d45d90af0233c35c4b77075746f6204f4bfb00c05ddb9eef487c1b27b652c30080c56f2ede02a0802a935f514bb6cae32e9d4a8c6637dcb2564798c3d1432f318e10c49b01af3aa59203ef3fbd03aa826bb2380e7d1c5c29e19a3c9bcdce08c15df42aa7d1dc0b8008533bffd70fc34b75e0907b1c4e13be7cd8b452331bd7366ce9ef0c9d6181fbc7f1c96d7081553232c744a65", 0xea, 0x7}, {&(0x7f0000000280)="68b65333a785249e01479dd42904bdad2fc535a7b29ad1ae60251b6c0274203912dbe31ba7b73f2f7bdb94c3ba3c6802fe0451a6726a4b9540872e91999f2bb9ba05d0b101d84c77a4f91173ef2c16258dfc48fe0380dc11568bcd9be2545449507165bca22220f4a755d83cce0434ac32b0649ab8c81451a8f7383cae17f043fe51f030508342a1fd578e5502e210b20d5d63", 0x93, 0x3}, {&(0x7f0000000340)="8bb3c80503c32ec5d2ddcffe740336d3593cfecf", 0x14, 0x4}, {&(0x7f0000000380)="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", 0x1000, 0x3}], 0x43, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f00000014c0)={&(0x7f0000001480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0xaf6}) r2 = syz_open_dev$media(&(0x7f0000001500)='/dev/media#\x00', 0x7, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000001540), &(0x7f0000001580)=0x40) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/capi/capi20ncci\x00', 0x12000, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f0000001600)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001640)='TRUE', 0x4, 0x0) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000001680)={0x7, 0x9, 0x81}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001700)={0x0, r2, 0x0, 0x8, &(0x7f00000016c0)='seclabel'}, 0x30) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001740)=0x0) r6 = accept4$rose(r3, &(0x7f0000001780)=@short={0xb, @dev, @netrom}, &(0x7f00000017c0)=0x1c, 0x80000) kcmp(r4, r5, 0x2, r1, r6) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000001800)=0x7) r7 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000002b80)=0xe8) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000002bc0)={'eql\x00', r8}) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002c00)='/selinux/checkreqprot\x00', 0xc2802, 0x0) setsockopt$IP_VS_SO_SET_DEL(r9, 0x0, 0x484, &(0x7f0000002c40)={0x2c, @multicast2, 0x4e23, 0x3, 'sed\x00', 0x0, 0xa8bd83c, 0x6b}, 0x2c) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000003200)={0x7, &(0x7f0000002c80)=""/239, &(0x7f0000003140)=[{0xbfc, 0xb7, 0x1a2, &(0x7f0000002d80)=""/183}, {0x57, 0x34, 0x401, &(0x7f0000002e40)=""/52}, {0x6, 0xdb, 0xffffffff, &(0x7f0000002e80)=""/219}, {0x9, 0x6, 0xf59, &(0x7f0000002f80)=""/6}, {0xffffff3a, 0xc, 0x1, &(0x7f0000002fc0)=""/12}, {0x4d97, 0x89, 0xfff, &(0x7f0000003000)=""/137}, {0x9, 0x57, 0x2, &(0x7f00000030c0)=""/87}]}) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r10, 0x84, 0x7, &(0x7f0000003240), &(0x7f0000003280)=0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000032c0)={0xffffffffffffffff}) connect$rds(r11, &(0x7f0000003300)={0x2, 0x4e23, @loopback}, 0x10) ioctl$KVM_TRANSLATE(r10, 0xc018ae85, &(0x7f0000003340)={0x954e6083cfb36eca, 0x4, 0x0, 0x1c, 0x3}) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000003380)=0x4, &(0x7f00000033c0)=0x4) r12 = openat$vcs(0xffffffffffffff9c, &(0x7f0000003400)='/dev/vcs\x00', 0x40000, 0x0) ioctl$KVM_GET_DEBUGREGS(r12, 0x8080aea1, &(0x7f0000003440)) 18:51:13 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 330.347740] overlayfs: './file0' not a directory 18:51:13 executing program 1: chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000540)=[{}, {}]}) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x72bdf1e6a0acecc1) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000100)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r4, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x0, 0x3}]) r5 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r5, 0x1000000000016) dup2(r2, r3) pivot_root(0x0, &(0x7f0000000440)='./file1/file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000840)=""/217, 0xd9}, {&(0x7f0000000a40)=""/148, 0x94}], 0x2}, 0x10001}, {{0x0, 0x0, &(0x7f0000002d80), 0x0, &(0x7f0000002e00)=""/178, 0xb2}, 0x3}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {&(0x7f0000003040)=""/30, 0x1e}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000004440)=""/2, 0x2}}, {{&(0x7f0000006940)=@alg, 0x80, 0x0}, 0xfffffffffffffffd}, {{0x0, 0x0, 0x0}}], 0x7, 0x1, &(0x7f0000008b40)) chdir(0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:51:13 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 330.634147] overlayfs: filesystem on './file0' not supported as upperdir 18:51:16 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:16 executing program 3: chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000540)=[{}, {}]}) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x72bdf1e6a0acecc1) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000100)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r4, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x0, 0x3}]) r5 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r5, 0x1000000000016) dup2(r2, r3) pivot_root(0x0, &(0x7f0000000440)='./file1/file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000840)=""/217, 0xd9}, {&(0x7f0000000a40)=""/148, 0x94}], 0x2}, 0x10001}, {{0x0, 0x0, &(0x7f0000002d80), 0x0, &(0x7f0000002e00)=""/178, 0xb2}, 0x3}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {&(0x7f0000003040)=""/30, 0x1e}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000004440)=""/2, 0x2}}, {{&(0x7f0000006940)=@alg, 0x80, 0x0}, 0xfffffffffffffffd}, {{0x0, 0x0, 0x0}}], 0x7, 0x1, &(0x7f0000008b40)) chdir(0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:51:16 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:16 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x226, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x0, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000380)=""/55, 0x37, 0x0, &(0x7f00000003c0)={0x9, @remote={[], 0x1}}, 0x12) write$P9_RVERSION(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="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"/528], 0x15) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r1, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) request_key(&(0x7f0000000400)='trusted\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)='\x00', 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xb) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) 18:51:16 executing program 1: chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000540)=[{}, {}]}) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x72bdf1e6a0acecc1) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000100)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r4, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x0, 0x3}]) r5 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r5, 0x1000000000016) dup2(r2, r3) pivot_root(0x0, &(0x7f0000000440)='./file1/file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000840)=""/217, 0xd9}, {&(0x7f0000000a40)=""/148, 0x94}], 0x2}, 0x10001}, {{0x0, 0x0, &(0x7f0000002d80), 0x0, &(0x7f0000002e00)=""/178, 0xb2}, 0x3}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {&(0x7f0000003040)=""/30, 0x1e}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000004440)=""/2, 0x2}}, {{&(0x7f0000006940)=@alg, 0x80, 0x0}, 0xfffffffffffffffd}, {{0x0, 0x0, 0x0}}], 0x7, 0x1, &(0x7f0000008b40)) chdir(0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:51:16 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:16 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:16 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) socket(0xa, 0x4000000001, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x60, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={r2, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000000)={0x40, 0x80000000, @name="1a4c4e485c3c8ef6d0e4aa47f7063eb584f83143c777695605155f433acc5f35"}) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="01007d1d3438fc0a06ce79511bd29ff7f50080f20000"], 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2}}, 0x80000000, 0x20, 0xffffffff, 0x0, 0x10}, 0x98) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000240)={0x0, 0x1}, 0x8) socket$kcm(0x10, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f00000015c0)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r5, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 18:51:16 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:16 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:16 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:17 executing program 1: chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000540)=[{}, {}]}) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x72bdf1e6a0acecc1) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000100)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r4, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x0, 0x3}]) r5 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r5, 0x1000000000016) dup2(r2, r3) pivot_root(0x0, &(0x7f0000000440)='./file1/file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000840)=""/217, 0xd9}, {&(0x7f0000000a40)=""/148, 0x94}], 0x2}, 0x10001}, {{0x0, 0x0, &(0x7f0000002d80), 0x0, &(0x7f0000002e00)=""/178, 0xb2}, 0x3}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {&(0x7f0000003040)=""/30, 0x1e}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000004440)=""/2, 0x2}}, {{&(0x7f0000006940)=@alg, 0x80, 0x0}, 0xfffffffffffffffd}, {{0x0, 0x0, 0x0}}], 0x7, 0x1, &(0x7f0000008b40)) chdir(0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:51:17 executing program 3: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:17 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:17 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:17 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14, 0x13, 0x1, {0x2, 0x3, 0x2}}, 0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) socket$inet6(0xa, 0x3, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a80)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) keyctl$chown(0x4, 0x0, r2, r3) r4 = socket$inet6(0xa, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000004a80)={0x0, 0x0, 0x0}, &(0x7f0000004ac0)=0xc) keyctl$chown(0x4, 0x0, r5, r6) r7 = socket$inet6(0xa, 0x3, 0x1) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000004a80)={0x0, 0x0, 0x0}, &(0x7f0000004ac0)=0xc) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) keyctl$chown(0x4, 0x0, r8, r9) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fstat(r10, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r11) getgroups(0x9, &(0x7f0000000240)=[r3, 0xee00, r6, r9, 0xffffffffffffffff, r11, 0xee00, 0x0, 0xee00]) setregid(0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000380)={0x90, 0x0, 0x5, {0x0, 0x1, 0x11, 0x7fffffff, 0xe, 0xa1ad, {0x2, 0x864, 0x7, 0x8001, 0x8, 0x15d, 0x9c41, 0xdbc, 0xa797, 0x10001, 0xda5c, r1, r12, 0x400, 0x3f}}}, 0x90) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000300)="25bca274769e620aa734fa2195e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef87dc4555b6462840be8fe2acc5c366dc22a571993801d5b47fc1607867c551fe9d22ad", 0x5d, 0x400}], 0x0, 0x0) 18:51:17 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:51:17 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:17 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:51:17 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) getpeername(r0, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000280)=0x80) bind$rxrpc(r1, &(0x7f0000000380)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e21, @remote}}, 0x24) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0x11e, &(0x7f0000000200)={0x0}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) 18:51:17 executing program 0: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:51:17 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:51:17 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x210d81) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f00000000c0)=0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaace8, &(0x7f0000000100)=[{&(0x7f0000000380)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef40790a6dcffec134d4da6fe57266b52e87b9b2", 0x4d, 0x400}], 0x0, 0x0) r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) ptrace$setregs(0xd2d30703e93db799, r1, 0x6fe72d3b, &(0x7f0000000140)="0c688685b1e380c2411faaf20a2d202528ed432fae0d9c7e863fd4e04bbd7b2e26ad41fade48a26a440acccb41e80502ded35653c345e667bbf1d1fe4e05b383356c382e6d690cd1a27e30f92dc655391651edcdb2a81204d189d84805018f59189da7655a2ba0ae4f6ff3547dfd471b6051ba99f89f7346c4d722e4ca012f6c72d5437c524cfedf135927d595c2745a0e668151a5e49a47a6a9aa8f9d63e8aaf6d87343894f8fbb7f485bf5d5577b2bcd9c72cc1bf48314f925079df52f206ed3") 18:51:17 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) write$uinput_user_dev(r0, &(0x7f0000000380)={'syz0\x00', {0x6, 0xfe00, 0x5, 0x9}, 0x10, [0x1, 0x30cfed1, 0x6, 0x3, 0x0, 0x200, 0x1ff, 0x7, 0x1, 0x6, 0x4ba, 0x100, 0x401, 0x4, 0x3ff, 0x80000001, 0x6, 0x8000, 0x8, 0x2, 0x8, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x4, 0x7, 0xffd, 0x401, 0x3, 0x1e, 0x2, 0x0, 0x2, 0x8, 0x1, 0x6, 0x400, 0x8, 0x6, 0xffffffff, 0xa47, 0x8, 0x1ff, 0x5, 0x3ff, 0x8, 0x10000, 0x5, 0xfff, 0x8001, 0x1b7, 0x101, 0x1, 0x10001, 0x1, 0x3, 0x0, 0x80, 0x47, 0x3, 0x8001, 0x6, 0x5], [0x6, 0x8, 0x2, 0x70b18d8, 0x6, 0x0, 0x1f, 0x0, 0x0, 0x20, 0xf84, 0x3, 0x80000000, 0x4, 0x6, 0x6, 0x2, 0xffff8000, 0x8, 0x2, 0x9, 0x6, 0x4, 0x3, 0x7, 0x71, 0x80a, 0x1, 0xf90, 0x8, 0xe101, 0x1, 0x6, 0xffffffff, 0x1, 0x6e59, 0x5, 0x400, 0xa59, 0x5, 0x7, 0x6, 0x281, 0x6, 0x1000, 0x7, 0xb3d, 0xb8, 0x2, 0x8, 0x3, 0x3f, 0x3d93, 0x6, 0x8, 0x8, 0xffff, 0x8, 0x1ff, 0x3, 0x4, 0x9, 0x400, 0x1], [0x4, 0x4a1, 0x3, 0x8000, 0x7f, 0x4, 0x5, 0x4, 0x9d5, 0x6, 0x8001, 0x8, 0x800, 0xfffffffa, 0x8a, 0x7, 0x800, 0x7d1, 0x2, 0xba, 0x3, 0x5, 0x80, 0x6, 0x6, 0x400, 0x80000000, 0x6, 0xff, 0x1, 0x5, 0x0, 0xfffffffd, 0x9, 0x87, 0x1, 0x7ff, 0x4, 0x3, 0x7, 0x8, 0x3, 0x200, 0x3, 0x20, 0x1, 0xa55, 0x20, 0x5, 0x3ff, 0x1, 0x81, 0x6, 0x1, 0x5, 0x2, 0xffffffff, 0x4, 0xffffffff, 0x80, 0x80000001, 0x6, 0xffffffff, 0x6], [0x200, 0x2, 0x65, 0x80000001, 0x400, 0x1, 0x1ba, 0xff, 0x2, 0x4, 0xfffffffa, 0x3b54, 0x4, 0x20, 0x9, 0x1, 0x9, 0xd4, 0x7, 0x9, 0x0, 0x1, 0x7f, 0x5439, 0x3f, 0x80000001, 0x5, 0x409, 0x7, 0xffffffff, 0x8001, 0x428b, 0x9, 0x800, 0x7f, 0x64f0, 0x5, 0x6, 0x10001, 0xfffffff8, 0x7f, 0x401, 0x7, 0x5, 0x5, 0x8, 0x12b5d562, 0x0, 0x8, 0xe2, 0x7fffffff, 0xade5, 0x0, 0x3f, 0x3, 0x5, 0x6, 0xffffffff, 0x7fff, 0x7, 0x7f, 0x1, 0x1f]}, 0x45c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x80000006}]}, 0x10) r2 = accept(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3, &(0x7f0000000180)=0x80) write$nbd(r2, &(0x7f00000001c0)={0x67446698, 0x0, 0x4, 0x3, 0x4, "62c79234b3cb32c6d9669883e52666dc79e4acde52c7fb99573e7fd08fdc24d3236cbe35534df6d20d1843a766d2152632efe820798c1bb24d28dbb1c1a826d7e7399a3da8d409a60533efef730eb5a2aa0dff11577d93fb58a585ae5c09c50ab0c99f76ccce554f6be5c064d844a242f29c9253c7697c108b65e646af17cf13db1f7c34451c1dfa16e0eb77acbb09b489cf2c226314eb10fc5b4b4c7b564a9221f5d0ac0a35c49943ce6bf284ddd7c2cac44c5f4cc4dfc1778a50bd8a152210d9ca2545e7f4fb"}, 0xd7) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f00000000c0)={0x3303, 0x24, [0x3, 0x20, 0xa562, 0x40, 0x9, 0xe0b, 0x200, 0x4, 0x0]}) r5 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfec8) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) splice(r7, 0x0, r1, 0x0, 0x7, 0x8) 18:51:17 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:17 executing program 0: setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180)=@gcm_128={{}, "463a92342d73f68f", "e8ca4c858b16eda5c8a30fb9e980c03c", "d565ab1b", "3bd5a4956999b1f6"}, 0x28) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)=ANY=[]) perf_event_open(&(0x7f0000000440)={0x2, 0xc2, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000400)) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 18:51:17 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r8, 0x0, 0x0) lseek(r8, 0xfffffffffffffffe, 0x1) sendto$ax25(r8, &(0x7f0000000040)="1b5307398a131c26f2f1e14d1babeda274e83d75b1e3b4d0dcc8bd9e596b7bbb34cee9c52cbb9b00e69b3a386280e48d613be18855d2a3d93fd4f933180453dda85c2ce3cc4a010d94fb1e25ba32ead45da0136cd7dc73e1b7312563b72511a37cfdd24a24f536", 0x67, 0x48004, &(0x7f00000000c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff49, 0x0, 0x0, 0xfffffee8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x1acd3e2}, 0xc) ioctl$KVM_RUN(r7, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x2) [ 334.114826] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 334.144801] EXT4-fs (loop3): Invalid log block size: 101711873 18:51:17 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:17 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x9) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x1002000, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}, 0x2c, {[{@access_user='access=user'}, {@version_u='version=9p2000.u'}, {@debug={'debug', 0x3d, 0xffffffff}}, {@access_any='access=any'}], [{@obj_role={'obj_role', 0x3d, 'bridge0\x00'}}, {@appraise_type='appraise_type=imasig'}]}}) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4004510d, &(0x7f0000000040)) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f00000002c0)={[], 0xffff, 0x20, 0x8, 0x0, 0x4, 0x102000, 0x100000, [], 0x8}) [ 334.310177] net_ratelimit: 6 callbacks suppressed [ 334.310182] protocol 88fb is buggy, dev hsr_slave_0 [ 334.320202] protocol 88fb is buggy, dev hsr_slave_1 18:51:17 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:17 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:18 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) write$uinput_user_dev(r0, &(0x7f0000000380)={'syz0\x00', {0x6, 0xfe00, 0x5, 0x9}, 0x10, [0x1, 0x30cfed1, 0x6, 0x3, 0x0, 0x200, 0x1ff, 0x7, 0x1, 0x6, 0x4ba, 0x100, 0x401, 0x4, 0x3ff, 0x80000001, 0x6, 0x8000, 0x8, 0x2, 0x8, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x4, 0x7, 0xffd, 0x401, 0x3, 0x1e, 0x2, 0x0, 0x2, 0x8, 0x1, 0x6, 0x400, 0x8, 0x6, 0xffffffff, 0xa47, 0x8, 0x1ff, 0x5, 0x3ff, 0x8, 0x10000, 0x5, 0xfff, 0x8001, 0x1b7, 0x101, 0x1, 0x10001, 0x1, 0x3, 0x0, 0x80, 0x47, 0x3, 0x8001, 0x6, 0x5], [0x6, 0x8, 0x2, 0x70b18d8, 0x6, 0x0, 0x1f, 0x0, 0x0, 0x20, 0xf84, 0x3, 0x80000000, 0x4, 0x6, 0x6, 0x2, 0xffff8000, 0x8, 0x2, 0x9, 0x6, 0x4, 0x3, 0x7, 0x71, 0x80a, 0x1, 0xf90, 0x8, 0xe101, 0x1, 0x6, 0xffffffff, 0x1, 0x6e59, 0x5, 0x400, 0xa59, 0x5, 0x7, 0x6, 0x281, 0x6, 0x1000, 0x7, 0xb3d, 0xb8, 0x2, 0x8, 0x3, 0x3f, 0x3d93, 0x6, 0x8, 0x8, 0xffff, 0x8, 0x1ff, 0x3, 0x4, 0x9, 0x400, 0x1], [0x4, 0x4a1, 0x3, 0x8000, 0x7f, 0x4, 0x5, 0x4, 0x9d5, 0x6, 0x8001, 0x8, 0x800, 0xfffffffa, 0x8a, 0x7, 0x800, 0x7d1, 0x2, 0xba, 0x3, 0x5, 0x80, 0x6, 0x6, 0x400, 0x80000000, 0x6, 0xff, 0x1, 0x5, 0x0, 0xfffffffd, 0x9, 0x87, 0x1, 0x7ff, 0x4, 0x3, 0x7, 0x8, 0x3, 0x200, 0x3, 0x20, 0x1, 0xa55, 0x20, 0x5, 0x3ff, 0x1, 0x81, 0x6, 0x1, 0x5, 0x2, 0xffffffff, 0x4, 0xffffffff, 0x80, 0x80000001, 0x6, 0xffffffff, 0x6], [0x200, 0x2, 0x65, 0x80000001, 0x400, 0x1, 0x1ba, 0xff, 0x2, 0x4, 0xfffffffa, 0x3b54, 0x4, 0x20, 0x9, 0x1, 0x9, 0xd4, 0x7, 0x9, 0x0, 0x1, 0x7f, 0x5439, 0x3f, 0x80000001, 0x5, 0x409, 0x7, 0xffffffff, 0x8001, 0x428b, 0x9, 0x800, 0x7f, 0x64f0, 0x5, 0x6, 0x10001, 0xfffffff8, 0x7f, 0x401, 0x7, 0x5, 0x5, 0x8, 0x12b5d562, 0x0, 0x8, 0xe2, 0x7fffffff, 0xade5, 0x0, 0x3f, 0x3, 0x5, 0x6, 0xffffffff, 0x7fff, 0x7, 0x7f, 0x1, 0x1f]}, 0x45c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x80000006}]}, 0x10) r2 = accept(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3, &(0x7f0000000180)=0x80) write$nbd(r2, &(0x7f00000001c0)={0x67446698, 0x0, 0x4, 0x3, 0x4, "62c79234b3cb32c6d9669883e52666dc79e4acde52c7fb99573e7fd08fdc24d3236cbe35534df6d20d1843a766d2152632efe820798c1bb24d28dbb1c1a826d7e7399a3da8d409a60533efef730eb5a2aa0dff11577d93fb58a585ae5c09c50ab0c99f76ccce554f6be5c064d844a242f29c9253c7697c108b65e646af17cf13db1f7c34451c1dfa16e0eb77acbb09b489cf2c226314eb10fc5b4b4c7b564a9221f5d0ac0a35c49943ce6bf284ddd7c2cac44c5f4cc4dfc1778a50bd8a152210d9ca2545e7f4fb"}, 0xd7) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f00000000c0)={0x3303, 0x24, [0x3, 0x20, 0xa562, 0x40, 0x9, 0xe0b, 0x200, 0x4, 0x0]}) r5 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfec8) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) splice(r7, 0x0, r1, 0x0, 0x7, 0x8) 18:51:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e000000110081aee405d10200000e00fa076b000900000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0xfffffffffffffe44}], 0x1}, 0x0) 18:51:18 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:18 executing program 1: bpf$MAP_CREATE(0x400000000000000, &(0x7f0000000040)={0x0, 0x0, 0x800, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x15f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x3c) socket(0x10, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) r1 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)="42b536a50f2718a8fc53a79f91e5800bbc726363", 0x14, 0x0) keyctl$instantiate(0xc, r2, &(0x7f0000000140)=@encrypted_load={'load ', 'default', 0x20, 'trusted:', '[vboxnet0{{mime_typeppp0', 0x20, 0xfff, 0x20, [0x1dca664324101cd6, 0x57, 0x37, 0x39, 0x64]}, 0x49, 0xfffffffffffffffc) dup3(r1, r0, 0x0) [ 334.731182] ptrace attach of "/root/syz-executor.5"[13643] was attempted by "/root/syz-executor.5"[13645] 18:51:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getcwd(&(0x7f0000000000)=""/29, 0x1d) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="9b752d31672fc3ab9582f32be1fb81c15c70"]) 18:51:18 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 334.936061] ptrace attach of "/root/syz-executor.5"[13653] was attempted by "/root/syz-executor.5"[13655] 18:51:18 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:18 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:18 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000100)={0x2, 0x2, 0xfffffff9, 0xfff, 0x6, 0x1}) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=', @ANYRESHEX]) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, &(0x7f0000000200)) 18:51:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'dummy0\x00', 0x0}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x400, 0x70bd29, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x4c0000, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000480)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-aesni\x00'}, 0x58) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f00000002c0)={0x2, &(0x7f0000000240)=[{0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f0000000440)={r5, 0xa, &(0x7f0000000340)=[0x4, 0x80, 0x2, 0x7, 0x7fffffff, 0x1b, 0x2, 0x6, 0x1f, 0x9], &(0x7f0000000380)=[0x45e, 0xfff, 0x1, 0x3f, 0x5], 0x64, 0x4, 0x0, &(0x7f00000003c0)=[0x8000, 0x20, 0x6, 0x81], &(0x7f0000000400)=[0x5]}) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) ioctl$SIOCGIFHWADDR(r6, 0x8927, &(0x7f00000001c0)) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="3400000013000300000000001000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000014001600100001000c0005000000000000000000"], 0x34}}, 0x0) 18:51:18 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x8d85e38c4dfb2820) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x9) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x1002000, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}, 0x2c, {[{@access_user='access=user'}, {@version_u='version=9p2000.u'}, {@debug={'debug', 0x3d, 0xffffffff}}, {@access_any='access=any'}], [{@obj_role={'obj_role', 0x3d, 'bridge0\x00'}}, {@appraise_type='appraise_type=imasig'}]}}) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4004510d, &(0x7f0000000040)) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f00000002c0)={[], 0xffff, 0x20, 0x8, 0x0, 0x4, 0x102000, 0x100000, [], 0x8}) [ 335.161673] ptrace attach of "/root/syz-executor.5"[13669] was attempted by "/root/syz-executor.5"[13670] 18:51:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x9) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x1002000, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}, 0x2c, {[{@access_user='access=user'}, {@version_u='version=9p2000.u'}, {@debug={'debug', 0x3d, 0xffffffff}}, {@access_any='access=any'}], [{@obj_role={'obj_role', 0x3d, 'bridge0\x00'}}, {@appraise_type='appraise_type=imasig'}]}}) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4004510d, &(0x7f0000000040)) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f00000002c0)={[], 0xffff, 0x20, 0x8, 0x0, 0x4, 0x102000, 0x100000, [], 0x8}) 18:51:18 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, 0x0, &(0x7f0000000340)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r5, 0x1, 0x6, @remote}, 0x10) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{0x0}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x1, 0x0, 0x0) 18:51:19 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x12, r0, 0x0) write$tun(r0, 0x0, 0xfffffffffffffef0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) socketpair$unix(0x1, 0x77eee2861c4f7c4e, 0x0, &(0x7f00000002c0)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x400000, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score_adj\x00') perf_event_open(0x0, 0xffffffffffffffff, 0xc, r6, 0x11) mlockall(0x7) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) fchdir(0xffffffffffffffff) syz_genetlink_get_family_id$team(0x0) r8 = socket$inet(0x2, 0x20000000000003, 0x3) sendmmsg(r8, &(0x7f00000038c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0xffffffffffffff5d, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x2) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) open(0x0, 0x0, 0x0) r9 = dup(r7) bind$inet6(r7, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) setsockopt$inet_tcp_int(r9, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r9, 0x6, 0x18, &(0x7f00000001c0), 0x4) r10 = open(&(0x7f0000000240)='./bus\x00', 0x100000141042, 0x0) ftruncate(r10, 0x10099b7) sendfile(r7, r10, 0x0, 0x8000fffffffe) connect$unix(r9, &(0x7f0000000400)=@abs, 0x6e) 18:51:19 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:19 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:19 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:19 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000380)) ioctl$int_in(r0, 0x5421, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0, 0x0}) fcntl$setownex(r0, 0xf, &(0x7f00000002c0)={0x1, r1}) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x80c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x2b, &(0x7f0000000000)=0x7fff, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='htcp\x00', 0x5) waitid(0x1, 0xffffffffffffffff, &(0x7f0000000140), 0x8, &(0x7f00000001c0)) 18:51:19 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, 0x0, 0x0) geteuid() r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8002, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) lseek(r3, 0xfffffffffffffffd, 0x1) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x2710, 0x0, &(0x7f0000ffb000/0x4000)=nil}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in=@remote, @in=@initdev}}, {{@in6=@mcast1}}}, &(0x7f00000000c0)=0xe8) dup2(r4, r1) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 18:51:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c00000010003b0e0000000000000000000000009025a6c086c73c842bdb8d5a5d1cc65042618d9805b6a22d13b9f8083fdc6375680b3ac4e3f4e7a768afcb0efd6f727411453543dc94fdfa728052857f90c6ed3cfeb73535a98589e0ffd01217891fe628d6b3f0c0bcd3c78dfc32ae8bd6eb0ef1c26b3ed3f02260f8c7791c188ad29242428f6c3ab588068263a9c4e989c9b9b25054df2b07925479d2c65f4ba228f397bda406d9ee62595d497251e5995c532abc8e9a0dc6847b6b572b317de69b8e765d4854146d6d7622458b7bf8", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c0002000800090100028000"], 0x3}}, 0x0) 18:51:21 executing program 3: write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="fdff0000000000660fbe26288c"], 0xd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:51:21 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:21 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000680)={0x0, 0x0, [], @bt={0x4, 0x9, 0x7, 0x2, 0x6, 0x8, 0x10, 0x2}}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x200) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x8012, r2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$KVM_GET_API_VERSION(r3, 0xae00, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000100)={0x0, 0xfddf, &(0x7f00000000c0)={&(0x7f0000000340)={0x14, r6, 0x701, 0x0, 0x0, {0x6, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000fc0)={0x1d4, r6, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ipddp0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffff00}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdd}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x4}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4}, 0x40000) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100), &(0x7f00000002c0)=0xe, 0x80000) getdents64(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000300)={'bcs\a\x00', 0xa2}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, &(0x7f00000003c0)=0x60, 0x2) ioctl(r7, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") write$binfmt_script(r1, &(0x7f00000011c0)=ANY=[@ANYRES64=0x0, @ANYRESDEC, @ANYRES32=r1, @ANYRESHEX=0x0, @ANYBLOB="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", @ANYRES16], 0x3a9) readv(r1, &(0x7f0000000740)=[{&(0x7f0000000180)=""/226, 0xe2}], 0x1) sendto$inet(r1, &(0x7f0000000140)="2eea214b340d8a8ed420", 0xfffffd93, 0x3f4dffd4bcb74fdc, 0x0, 0xfffffffffffffda8) 18:51:21 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x4, 0xee}]}, 0xc, 0x1) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f00000001c0)={&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ff5000/0x1000)=nil, 0x4000}) shmat(r0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/152) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000040)=""/22) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xac84e2, 0x0) 18:51:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r5, &(0x7f0000000380)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f0000000200)=0x80, 0x180800) write$binfmt_misc(r7, &(0x7f0000000340)={'syz1'}, 0x4) fcntl$setpipe(r7, 0x407, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r7, &(0x7f00000000c0), 0x2) 18:51:21 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x2) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) socket(0xa, 0x1, 0x0) r7 = socket(0x1000000010, 0x400000400080803, 0x0) r8 = dup(r7) write$cgroup_int(r8, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xffffffffffffff23) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r9}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000440)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000014c0)=""/205, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="240000001a0025f07e9451f68f2e9c920a0b49ffed000019806028000800100001000000", 0x24) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000480)='\x01S\xb8\x00\x00', 0x152) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r10, 0x0, 0x0) lseek(r10, 0xfffffffffffffffe, 0x1) getsockname$packet(r10, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r11 = open(&(0x7f0000000700)='./bus\x00', 0x200040, 0x88) r12 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r12, 0x0, 0x0) lseek(r12, 0xfffffffffffffffe, 0x1) getsockopt$inet_mreqn(r12, 0x0, 0xcbe59ac7eab1856b, &(0x7f00000007c0)={@rand_addr, @remote}, &(0x7f0000000800)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x89a1, &(0x7f0000000340)={@local, 0x39, r9}) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f00000003c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x200006, 0x0, 0x0, 0x0, 0xffffffffbfffffff, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 18:51:22 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x4}}, 0xa) write$FUSE_ATTR(r1, &(0x7f00000002c0)={0x78}, 0x78) 18:51:22 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x2000, 0x0) ioctl$GIO_CMAP(r6, 0x4b70, &(0x7f0000000100)) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r10, 0x0, 0x0) lseek(r10, 0xfffffffffffffffe, 0x1) sendmsg$alg(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000300)="c46a1087454fc2e69dd54e6b9028ace3f854b28286a0d002e0921b5960f1a06ce70a57f037f433f90a6f2002b5abdff2eba992d99b5a8f6b6b9f0b4bc62153390e73cad55f8947a3fa2b1b93f5d0a36e4a3855ff3898b3308483ba38f676672a2640b58ef21cf5678aa1d93bb6397680", 0x70}, {&(0x7f0000001440)="7f6402a00ddbb486a0928d9256a692d429f6dcb4ca9576c5efbcc677f841ea14e451b38ecd87538db08132c432e8ad0f6a28a66bd475989aa1cf30d0b8b862c01153c0ce33b01dcfb43ed9be2eb27c792341ae34c9df4b1dc8b1e1013b00f21ed13076676251d5c70b632c7305ac9fa70a5c9df2cfa9f21ad136c090af44e3346b0a40dfb5366f5b67c86c9818cffbf316df1dc137d863c2324bb9fa77df67035fc6d2c045954cbdf32fcb271e0e71845f45605fdb6010a73e50494bed776d6eb928b280c88a1f76bde62c77a093b2c5189f10593219c0d075d2e8b7bc38423bb35ed471", 0xe4}, {&(0x7f0000001540)="6034f1fe08d331d7840a0740436efdf7103a36039d835bdb302a46d980294e6aa10e781e8b2475aae5142474a6f7963dab7f098880ebfa57406360ad8e053ce49868ae1eab2fb44b3034cb25e5a617d119adafe73b82e9c0b3d829a2b5a20162dabd5e3a64154c1658417c0a894945f47abadef714b28c01a9b19c773dcf3530927ed15e9aeaa7dfc1d6beaf7c398dc9a5f6acfd0f1961860657b8c92860ad3fac9e437f1b35fb295566ebbc1fb6f84b51da230a9aebfd8a08b207289826527174f62cb7bea14d3b1d12", 0xca}], 0x3, &(0x7f0000001640)=[@assoc={0x18, 0x117, 0x4, 0x7bb8000}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x2}, @iv={0xa8, 0x117, 0x2, 0x94, "65c9c805237fa0442016fe58ef38001a28e280ad3f74f9455f26994d5776c2d70c35d0f86ad4600e64d4f9ae14bd32851ceb7173b23cb860a9d2ae7bc9ff7afcd00b12dd4f63efab8f371e5e3b8de49ebd449d91b2920f38ad06df9c326362ac4507a7ea1512f200ac551fc3f1493384c3d894f75d7c634bddd839a42d2dceb4c4a62e4b212fdc2715c786d1a123cb52dce262be"}], 0x10f0}, 0x40000e1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 18:51:22 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r4 = dup2(r3, r2) write$P9_RLINK(r4, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 338.937389] Unknown ioctl 19312 18:51:22 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 339.605628] Unknown ioctl 19312 18:51:24 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:24 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)="62f37cc7fc906dc9b8c1421ea3ed0b45c47c95616226fac369524c42d2f129cecfbbd11288f8bfab79acf5afd9e808bbf1", 0x31, r0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) readv(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12004, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) connect$inet(0xffffffffffffffff, 0x0, 0x5b) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000280)={0x9, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$chown(0x4, r1, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="700000007d0200000050412d1ccad951fbff016c50de26545f00010003000000040400000004000000a5a104fc00000700000000000000000001000000000000001f0076626f786e6574302a5c656d3073797374656d286b657972696e67656d312c08006b657972696e670008002dd339616e30215b07006d643571756d28a060736aa27286f3846b9c4cd9e01a474092c6d4ae0740c123ac5835b93a7a47cddcb3ca749511407e95f4f01982e406b34011b9bc0fc355c8f8035b1a5c22baab9d9f27aa585881546032f3858b227d66995a00eceb48a5ec21eb"], 0xda) unshare(0x60000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'lapb0\x00', 0x10}) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, 0x0, &(0x7f0000000180)) syz_emit_ethernet(0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="aaaaaaaaaaaa192bce5e2dfb86dd60d8652b00140600fe800000000000", @ANYRES32=0x41424344, @ANYRESOCT], 0x0) 18:51:24 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:24 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0x80045510, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 18:51:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x2}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 18:51:24 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0x8108551b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 18:51:24 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:24 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @remote}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x211000c2}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xa454a72f209dea1f) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, r1}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) 18:51:24 executing program 0: r0 = socket$inet6(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206090200a843090626274d040016021500064004004c00007aa3c728f1c46b7b31afdc1338d54400009b84136ef75afb6cde448daa7227c43ab8620000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) [ 341.432137] audit: type=1804 audit(1570387884.929:177): pid=13815 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir742537008/syzkaller.k0FKB7/311/memory.events" dev="sda1" ino=17261 res=1 18:51:25 executing program 2: 18:51:25 executing program 2: [ 341.687572] IPVS: ftp: loaded support on port[0] = 21 18:51:25 executing program 0: [ 342.181339] audit: type=1804 audit(1570387885.679:178): pid=13840 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir742537008/syzkaller.k0FKB7/311/memory.events" dev="sda1" ino=17261 res=1 18:51:27 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:27 executing program 2: 18:51:27 executing program 3: 18:51:27 executing program 0: 18:51:27 executing program 1: 18:51:27 executing program 4: 18:51:27 executing program 1: 18:51:27 executing program 2: 18:51:27 executing program 0: 18:51:27 executing program 3: 18:51:27 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0x41045508, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 18:51:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x5, 0x16, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 18:51:30 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:51:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x0) close(r0) 18:51:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x4}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4000, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x0) 18:51:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000140)) 18:51:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r5, &(0x7f0000000380)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f0000000200)=0x80, 0x180800) write$binfmt_misc(r7, &(0x7f0000000340)={'syz1'}, 0x4) fcntl$setpipe(r7, 0x407, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r7, &(0x7f00000000c0), 0x2) 18:51:30 executing program 1 (fault-call:13 fault-nth:0): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:30 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000080)=0x101) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) [ 347.390554] FAULT_INJECTION: forcing a failure. [ 347.390554] name failslab, interval 1, probability 0, space 0, times 0 [ 347.416681] CPU: 1 PID: 13880 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 347.423729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.423736] Call Trace: [ 347.423755] dump_stack+0x138/0x197 [ 347.423778] should_fail.cold+0x10f/0x159 [ 347.443479] should_failslab+0xdb/0x130 [ 347.447468] kmem_cache_alloc_node_trace+0x280/0x770 [ 347.452583] ? pointer+0xb10/0xb10 [ 347.456226] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 347.460999] __kmalloc_node+0x3d/0x80 [ 347.464808] kvmalloc_node+0x4e/0xe0 [ 347.464825] alloc_netdev_mqs+0x7b/0xbc0 [ 347.464839] ? ip6_tnl_link_config+0xa10/0xa10 [ 347.464853] ip6_tnl_locate+0x3a8/0x7e0 [ 347.464867] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 347.485470] ip6_tnl_ioctl+0x3b1/0x920 [ 347.489375] ? ip6_tnl_locate+0x7e0/0x7e0 [ 347.493528] ? __mutex_lock+0x36a/0x1470 [ 347.497599] ? SOFTIRQ_verbose+0x10/0x10 [ 347.501681] ? ip6_tnl_locate+0x7e0/0x7e0 [ 347.505832] dev_ifsioc+0x5fc/0x7f0 [ 347.509460] ? dev_ifsioc+0x5fc/0x7f0 [ 347.513261] ? dev_ifname+0x100/0x100 [ 347.517071] dev_ioctl+0x4b7/0xcb0 [ 347.520702] ? dev_load+0x1b0/0x1b0 [ 347.524352] ? trace_hardirqs_on_caller+0x400/0x590 [ 347.529383] ? __might_sleep+0x93/0xb0 [ 347.533276] sock_ioctl+0x170/0x470 [ 347.536901] ? sock_ioctl+0x170/0x470 [ 347.540713] ? dlci_ioctl_set+0x40/0x40 [ 347.544742] do_vfs_ioctl+0x7ae/0x1060 [ 347.548637] ? selinux_file_mprotect+0x5d0/0x5d0 [ 347.553399] ? lock_downgrade+0x740/0x740 [ 347.557554] ? ioctl_preallocate+0x1c0/0x1c0 [ 347.561970] ? __fget+0x237/0x370 [ 347.565436] ? security_file_ioctl+0x89/0xb0 [ 347.569850] SyS_ioctl+0x8f/0xc0 [ 347.573216] ? do_vfs_ioctl+0x1060/0x1060 [ 347.577369] do_syscall_64+0x1e8/0x640 [ 347.581260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.586110] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.591305] RIP: 0033:0x459a59 [ 347.594492] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 347.602202] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 347.609473] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 347.616746] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 347.624026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 347.631296] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 [ 347.639643] protocol 88fb is buggy, dev hsr_slave_0 [ 347.640416] protocol 88fb is buggy, dev hsr_slave_0 [ 347.645044] protocol 88fb is buggy, dev hsr_slave_1 [ 347.650279] protocol 88fb is buggy, dev hsr_slave_1 [ 347.660786] protocol 88fb is buggy, dev hsr_slave_0 [ 347.666274] protocol 88fb is buggy, dev hsr_slave_1 [ 347.830129] protocol 88fb is buggy, dev hsr_slave_0 [ 347.835256] protocol 88fb is buggy, dev hsr_slave_1 18:51:31 executing program 1 (fault-call:13 fault-nth:1): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:31 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000000)=0x7fff, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r8, 0x0, 0x0) r9 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r9, 0x0, 0x0) lseek(r9, 0xfffffffffffffffe, 0x1) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r10, 0x0, 0x0) lseek(r10, 0xfffffffffffffffe, 0x1) lseek(r10, 0xfffffffffffffffe, 0x1) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRES64=r8, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES32=r5], @ANYRES64, @ANYRES64=r6, @ANYBLOB="675d20ccc4902059dc0d931bcf892499fecc7b723f0a17c3d0ca149ed4c4b90b0fc1aeb8eb6605f086d464f68f782af292d26b010000000000000073b9e68c0ec5b6ac3081", @ANYRES16=r7], 0xbe) r11 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r12 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r12, 0x0, 0x0) lseek(r12, 0xfffffffffffffffe, 0x1) r13 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r13, 0x0, 0x0) lseek(r13, 0xfffffffffffffffe, 0x1) getdents64(r13, 0x0, 0x85) r14 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r14, 0x0, 0x0) lseek(r14, 0xfffffffffffffffe, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r14, 0x40086408, &(0x7f00000001c0)={0x7f, 0x1636}) r15 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r15, 0x0, 0x0) lseek(r15, 0xfffffffffffffffe, 0x1) write$binfmt_misc(r15, &(0x7f0000000200)={'syz1', "9cfe773b384a2ad86d79ff731a4a6d3c72a1825418b0c08224f80490facb29d7fbf9c2ba7937fbf0ee451b62809ea88abc5e70f2e9452e9e477b31d04e8bb836eb9dc52fed0e9817ebbef65b252fd25460a215913f64a0c11006000320524884"}, 0x64) lseek(r11, 0xfffffffffffffffe, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r1, r11, 0x10, 0x2}, 0x10) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r16 = accept4(r3, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000280)) r17 = accept4$alg(r16, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r17, 0x0, 0x1ffffd, 0x0) 18:51:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r5, &(0x7f0000000380)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f0000000200)=0x80, 0x180800) write$binfmt_misc(r7, &(0x7f0000000340)={'syz1'}, 0x4) fcntl$setpipe(r7, 0x407, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r7, &(0x7f00000000c0), 0x2) [ 348.230504] protocol 88fb is buggy, dev hsr_slave_0 [ 348.236190] protocol 88fb is buggy, dev hsr_slave_1 18:51:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x3663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) preadv(r1, &(0x7f00000017c0), 0x33c, 0xf0ffff) [ 348.291819] FAULT_INJECTION: forcing a failure. [ 348.291819] name failslab, interval 1, probability 0, space 0, times 0 [ 348.309876] CPU: 1 PID: 13905 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 348.316959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.326319] Call Trace: [ 348.328918] dump_stack+0x138/0x197 [ 348.332561] should_fail.cold+0x10f/0x159 [ 348.336726] should_failslab+0xdb/0x130 [ 348.340723] kmem_cache_alloc_trace+0x4b/0x790 [ 348.345321] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 348.350957] __hw_addr_create_ex+0x5e/0x300 [ 348.355287] __hw_addr_add_ex+0x1b8/0x280 [ 348.359444] dev_addr_init+0xfd/0x1c0 [ 348.363244] ? dev_mc_flush+0x40/0x40 [ 348.367058] alloc_netdev_mqs+0x125/0xbc0 [ 348.371210] ? ip6_tnl_link_config+0xa10/0xa10 [ 348.375798] ip6_tnl_locate+0x3a8/0x7e0 [ 348.379778] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 348.384101] ? check_memory_region+0xd0/0x190 [ 348.388604] ip6_tnl_ioctl+0x3b1/0x920 [ 348.392494] ? mark_held_locks+0xb1/0x100 [ 348.396653] ? ip6_tnl_locate+0x7e0/0x7e0 [ 348.400808] ? trace_hardirqs_on_caller+0x400/0x590 [ 348.405837] ? check_preemption_disabled+0x3c/0x250 [ 348.410870] ? ip6_tnl_locate+0x7e0/0x7e0 [ 348.410884] dev_ifsioc+0x5fc/0x7f0 [ 348.410893] ? dev_ifsioc+0x5fc/0x7f0 [ 348.410904] ? dev_ifname+0x100/0x100 [ 348.410921] dev_ioctl+0x4b7/0xcb0 [ 348.422473] ? retint_kernel+0x2d/0x2d [ 348.422489] ? dev_load+0x1b0/0x1b0 [ 348.422499] ? trace_hardirqs_on_caller+0x400/0x590 [ 348.422520] ? check_preemption_disabled+0x3c/0x250 [ 348.422537] ? __might_sleep+0x93/0xb0 [ 348.422552] sock_ioctl+0x170/0x470 [ 348.422562] ? sock_ioctl+0x170/0x470 [ 348.422572] ? dlci_ioctl_set+0x40/0x40 [ 348.422584] do_vfs_ioctl+0x7ae/0x1060 [ 348.422598] ? selinux_file_mprotect+0x5d0/0x5d0 [ 348.422608] ? lock_downgrade+0x740/0x740 [ 348.422621] ? ioctl_preallocate+0x1c0/0x1c0 [ 348.442460] ? __fget+0x237/0x370 [ 348.442482] ? security_file_ioctl+0x89/0xb0 [ 348.442498] SyS_ioctl+0x8f/0xc0 [ 348.442508] ? do_vfs_ioctl+0x1060/0x1060 [ 348.442523] do_syscall_64+0x1e8/0x640 [ 348.442533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 348.442551] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 348.462922] RIP: 0033:0x459a59 [ 348.462929] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 348.462942] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 348.462949] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 18:51:32 executing program 1 (fault-call:13 fault-nth:2): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 348.462955] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 348.462961] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 348.462968] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 [ 348.893889] FAULT_INJECTION: forcing a failure. [ 348.893889] name failslab, interval 1, probability 0, space 0, times 0 [ 348.920174] CPU: 1 PID: 13925 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 348.927235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.936585] Call Trace: [ 348.939179] dump_stack+0x138/0x197 [ 348.942813] should_fail.cold+0x10f/0x159 [ 348.946963] should_failslab+0xdb/0x130 [ 348.950926] kmem_cache_alloc_node_trace+0x280/0x770 [ 348.956015] ? crng_backtrack_protect+0x80/0x80 [ 348.960842] __kmalloc_node+0x3d/0x80 [ 348.964647] kvmalloc_node+0x4e/0xe0 [ 348.968359] alloc_netdev_mqs+0x626/0xbc0 [ 348.972504] ip6_tnl_locate+0x3a8/0x7e0 [ 348.976485] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 348.980802] ip6_tnl_ioctl+0x3b1/0x920 [ 348.984677] ? ip6_tnl_locate+0x7e0/0x7e0 [ 348.988807] ? __mutex_lock+0x36a/0x1470 [ 348.992855] ? SOFTIRQ_verbose+0x10/0x10 [ 348.996906] ? retint_kernel+0x2d/0x2d [ 349.000881] ? ip6_tnl_locate+0x7e0/0x7e0 [ 349.005014] dev_ifsioc+0x5fc/0x7f0 [ 349.008625] ? dev_ifsioc+0x5fc/0x7f0 [ 349.012421] ? dev_ifname+0x100/0x100 [ 349.016210] dev_ioctl+0x4b7/0xcb0 [ 349.019742] ? retint_kernel+0x2d/0x2d [ 349.023623] ? dev_load+0x1b0/0x1b0 [ 349.027234] ? trace_hardirqs_on_caller+0x400/0x590 [ 349.032280] ? check_preemption_disabled+0x3c/0x250 [ 349.037284] ? __might_sleep+0x93/0xb0 [ 349.041156] sock_ioctl+0x170/0x470 [ 349.044762] ? sock_ioctl+0x170/0x470 [ 349.048545] ? dlci_ioctl_set+0x40/0x40 [ 349.052509] do_vfs_ioctl+0x7ae/0x1060 [ 349.056422] ? selinux_file_mprotect+0x5d0/0x5d0 [ 349.061171] ? lock_downgrade+0x740/0x740 [ 349.065312] ? ioctl_preallocate+0x1c0/0x1c0 [ 349.069709] ? __fget+0x237/0x370 [ 349.073153] ? security_file_ioctl+0x89/0xb0 [ 349.077555] SyS_ioctl+0x8f/0xc0 [ 349.080912] ? do_vfs_ioctl+0x1060/0x1060 [ 349.085064] do_syscall_64+0x1e8/0x640 [ 349.088946] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.093791] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 349.098974] RIP: 0033:0x459a59 [ 349.102148] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 349.109859] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 349.117122] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 349.124377] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 349.131638] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 349.138917] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 18:51:33 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="300000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffefffff000000070c0200000000000000000200"], 0x30}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000b00)) r5 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x100000) 18:51:33 executing program 3: r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) shmat(r0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/152) shmctl$IPC_RMID(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) 18:51:33 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5c4ab600", @ANYRES16=r1, @ANYBLOB="00042abd7000ffdbdf250800000020000200140001007f0000010000000000000000000000000800050000000000080006000600000008000400ff7f00e90800050001000000040003000c000300080008"], 0x3}}, 0x4000) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc0}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x7c, r1, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x31, 0x18}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6f}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xa936b799e871b131}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x1) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, r2, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$netrom_NETROM_N2(r5, 0x103, 0x3, &(0x7f00000002c0)=0x4, &(0x7f0000000300)=0x4) 18:51:33 executing program 1 (fault-call:13 fault-nth:3): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0xc0a, r0) ioctl$RTC_AIE_ON(r1, 0x7001) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RSETATTR(r2, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x100) ioctl$LOOP_SET_FD(r3, 0x1260, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') fcntl$setstatus(r4, 0x4, 0x46000) io_setup(0x2344, &(0x7f0000000100)=0x0) io_submit(r5, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r4, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 350.479773] FAULT_INJECTION: forcing a failure. [ 350.479773] name failslab, interval 1, probability 0, space 0, times 0 [ 350.492047] audit: type=1400 audit(1570387893.969:179): avc: denied { ioctl } for pid=13934 comm="syz-executor.0" path="socket:[54713]" dev="sockfs" ino=54713 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 350.526125] CPU: 0 PID: 13937 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 350.533169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.542531] Call Trace: [ 350.545136] dump_stack+0x138/0x197 [ 350.548787] should_fail.cold+0x10f/0x159 [ 350.552954] should_failslab+0xdb/0x130 [ 350.556943] kmem_cache_alloc_node_trace+0x280/0x770 [ 350.562068] __kmalloc_node+0x3d/0x80 [ 350.565881] kvmalloc_node+0x4e/0xe0 [ 350.569610] alloc_netdev_mqs+0x7aa/0xbc0 [ 350.573775] ip6_tnl_locate+0x3a8/0x7e0 [ 350.577757] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 350.582094] ip6_tnl_ioctl+0x3b1/0x920 [ 350.585983] ? ip6_tnl_locate+0x7e0/0x7e0 [ 350.590126] ? check_preemption_disabled+0x3c/0x250 [ 350.595173] ? ip6_tnl_locate+0x7e0/0x7e0 [ 350.599322] dev_ifsioc+0x5fc/0x7f0 [ 350.602950] ? dev_ifsioc+0x5fc/0x7f0 [ 350.606756] ? dev_ifname+0x100/0x100 [ 350.610561] dev_ioctl+0x4b7/0xcb0 [ 350.614103] ? retint_kernel+0x2d/0x2d [ 350.617989] ? dev_load+0x1b0/0x1b0 [ 350.621611] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 350.626366] ? check_preemption_disabled+0x3c/0x250 [ 350.631379] ? retint_kernel+0x2d/0x2d [ 350.635269] sock_ioctl+0x170/0x470 [ 350.638876] ? sock_ioctl+0x170/0x470 [ 350.642685] ? dlci_ioctl_set+0x40/0x40 [ 350.646659] do_vfs_ioctl+0x7ae/0x1060 [ 350.650552] ? selinux_file_mprotect+0x5d0/0x5d0 [ 350.655315] ? check_preemption_disabled+0x3c/0x250 [ 350.660345] ? ioctl_preallocate+0x1c0/0x1c0 [ 350.664872] ? security_file_ioctl+0x89/0xb0 [ 350.669297] SyS_ioctl+0x8f/0xc0 [ 350.672658] ? do_vfs_ioctl+0x1060/0x1060 [ 350.676819] do_syscall_64+0x1e8/0x640 [ 350.680712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.685571] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.691035] RIP: 0033:0x459a59 [ 350.694240] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 350.704214] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 350.711481] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 350.718806] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 350.726072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 350.733341] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 18:51:34 executing program 1 (fault-call:13 fault-nth:4): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0xffffffffffffff2e, 0x0, 0x1, 0x0, 0x5, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000500)={0x30, 0x2, 0x0, 0x0, 0x1, 0x4, 0xfffffffffffffffe}, 0x0) dup(r3) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') geteuid() ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000440)={0x0, @reserved}) creat(0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) lsetxattr$trusted_overlay_origin(&(0x7f0000000340)='./bus\x00', 0x0, 0x0, 0x0, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @mcast2}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0x5, @rand_addr="aaf3fc913cfd0b0f7feb461c9cfee64c"}], 0x58) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x10602, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x4000000000000002) sendfile(0xffffffffffffffff, r5, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r5, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="905cd99e06066bd3a10cc69f9b00abb7fbc831902c9fc4f9dec33823604b39a79e23798cd017faebccf11c16ae67b8b1f70801b82ef39baf0ea8622ed9460a3ac3c9607e0e2edd496f818c3f054484749a18f4f19f5167817c6e1e88b37f176cbd75300cf86d21a1eccbe57793df6fb6130bc20663a7b3e5e0ab47cc764cf2452177e0129ffe5ed5e5aedbb1e942c04511c578feecfd4d8d24b684b8575915b3c9db88c2907a8c727ae23d53d38ef93accaa5d8915ab78ebbbe665fe2273bcf832922a392fd1ade9a31c5f47b46d62ce6b89"], 0x14}, 0x1, 0x0, 0x0, 0x85}, 0x4000) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x42c) socket$inet6_udplite(0xa, 0x2, 0x88) [ 350.970310] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 350.995787] FAULT_INJECTION: forcing a failure. [ 350.995787] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 351.024652] CPU: 0 PID: 13954 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 351.031712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.041056] Call Trace: [ 351.043634] dump_stack+0x138/0x197 [ 351.047251] ? should_fail.cold+0x10a/0x159 [ 351.051560] should_fail.cold+0x10f/0x159 [ 351.055707] __alloc_pages_nodemask+0x1d6/0x7a0 [ 351.060416] ? __alloc_pages_slowpath+0x2930/0x2930 [ 351.065415] ? ip6_tnl_ioctl+0x3b1/0x920 [ 351.069472] ? trace_hardirqs_on_caller+0x400/0x590 [ 351.074489] alloc_pages_current+0xec/0x1e0 [ 351.078805] ? check_preemption_disabled+0x3c/0x250 [ 351.083810] __get_free_pages+0xf/0x40 [ 351.087682] get_zeroed_page+0x11/0x20 [ 351.091556] __dev_alloc_name+0xe6/0x2c0 [ 351.095608] ? __dev_get_by_name+0x140/0x140 [ 351.099998] ? strchr+0x38/0xb0 [ 351.103273] dev_get_valid_name+0xa3/0x1c0 [ 351.107492] ? dev_alloc_name+0x160/0x160 [ 351.111625] ? __lockdep_init_map+0x10c/0x570 [ 351.116106] register_netdevice+0x224/0xca0 [ 351.120427] ? netdev_change_features+0x80/0x80 [ 351.125082] ip6_tnl_create2+0x171/0x2c0 [ 351.129124] ip6_tnl_locate+0x549/0x7e0 [ 351.133091] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 351.137399] ip6_tnl_ioctl+0x3b1/0x920 [ 351.141279] ? ip6_tnl_locate+0x7e0/0x7e0 [ 351.145425] ? trace_hardirqs_on_caller+0x400/0x590 [ 351.150431] ? check_preemption_disabled+0x3c/0x250 [ 351.155532] ? ip6_tnl_locate+0x7e0/0x7e0 [ 351.159674] dev_ifsioc+0x5fc/0x7f0 [ 351.163283] ? dev_ifsioc+0x5fc/0x7f0 [ 351.167065] ? dev_ifname+0x100/0x100 [ 351.170850] dev_ioctl+0x4b7/0xcb0 [ 351.174375] ? dev_load+0x1b0/0x1b0 [ 351.177985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 351.182745] ? check_preemption_disabled+0x3c/0x250 [ 351.187746] ? retint_kernel+0x2d/0x2d [ 351.191626] sock_ioctl+0x170/0x470 [ 351.195242] ? sock_ioctl+0x170/0x470 [ 351.199044] ? dlci_ioctl_set+0x40/0x40 [ 351.203001] do_vfs_ioctl+0x7ae/0x1060 [ 351.210617] ? selinux_file_mprotect+0x5d0/0x5d0 [ 351.215445] ? lock_downgrade+0x740/0x740 [ 351.219576] ? ioctl_preallocate+0x1c0/0x1c0 [ 351.223983] ? __fget+0x237/0x370 [ 351.227423] ? security_file_ioctl+0x89/0xb0 [ 351.231839] SyS_ioctl+0x8f/0xc0 [ 351.235198] ? do_vfs_ioctl+0x1060/0x1060 [ 351.239342] do_syscall_64+0x1e8/0x640 [ 351.243211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.248040] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.253222] RIP: 0033:0x459a59 [ 351.256395] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 351.264096] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 351.271356] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 351.278618] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 351.285869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 351.293123] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 18:51:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="340000001c000500000000000000000002000000", @ANYRES32=r1, @ANYBLOB="10000000000c00438d00000000000000000000000000000000000000fc94baa88172e1cdfa1295a1fb98061e6cc3ae707f1f89808cb50ce660499886c84362729d0fc9277ac6715976ded38614bdb70f43e4"], 0x34}}, 0x0) 18:51:34 executing program 1 (fault-call:13 fault-nth:5): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r0, 0x1) pipe(&(0x7f0000000300)) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000180)) write$sndseq(r2, &(0x7f00000001c0), 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000000)={0x1, 0x0, 0x100, 0x4, {0x3, 0x1ff, 0x8, 0x4}}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r3, &(0x7f00000017c0), 0x333, 0x0) [ 351.320708] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:51:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0xe00) r5 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r5, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) r6 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r6, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) r7 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r7, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) sendfile(r7, r4, 0x0, 0xada2) arch_prctl$ARCH_SET_GS(0x1001, 0x1f) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14) r8 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r8, &(0x7f0000001240)={0x2, 0x0, @dev}, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000001840)={'rose0\x00'}) r9 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r9, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) r10 = socket(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000001900)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xffffff0d) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r11}) r12 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r12, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000002f00)=0xffffffd9) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r13}) [ 351.458857] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 351.513795] audit: type=1800 audit(1570387895.009:180): pid=13972 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=17314 res=0 [ 351.519920] FAULT_INJECTION: forcing a failure. [ 351.519920] name failslab, interval 1, probability 0, space 0, times 0 [ 351.575606] audit: type=1804 audit(1570387895.039:181): pid=13972 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir629572183/syzkaller.ES9FLb/255/file0" dev="sda1" ino=17314 res=1 [ 351.618624] CPU: 0 PID: 13971 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 351.625684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.638083] Call Trace: [ 351.640683] dump_stack+0x138/0x197 [ 351.644325] should_fail.cold+0x10f/0x159 [ 351.648483] should_failslab+0xdb/0x130 [ 351.652464] __kmalloc_track_caller+0x2ec/0x790 [ 351.657144] ? kstrdup_const+0x48/0x60 [ 351.661038] kstrdup+0x3a/0x70 [ 351.664234] kstrdup_const+0x48/0x60 [ 351.667956] kvasprintf_const+0xf7/0x170 [ 351.672023] kobject_set_name_vargs+0x5b/0x150 [ 351.676612] dev_set_name+0xa4/0xc0 [ 351.680243] ? device_initialize+0x430/0x430 [ 351.684658] ? lockdep_init_map+0x9/0x10 [ 351.688726] ? __init_waitqueue_head+0x36/0x90 [ 351.693324] netdev_register_kobject+0xc3/0x3a0 [ 351.698001] register_netdevice+0x814/0xca0 [ 351.702332] ? netdev_change_features+0x80/0x80 [ 351.707018] ip6_tnl_create2+0x171/0x2c0 [ 351.711085] ip6_tnl_locate+0x549/0x7e0 [ 351.715236] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 351.719568] ? check_memory_region+0xd0/0x190 [ 351.724077] ip6_tnl_ioctl+0x3b1/0x920 [ 351.728065] ? ip6_tnl_locate+0x7e0/0x7e0 [ 351.732228] ? trace_hardirqs_on_caller+0x400/0x590 [ 351.737261] ? check_preemption_disabled+0x3c/0x250 [ 351.742314] ? ip6_tnl_locate+0x7e0/0x7e0 [ 351.746470] dev_ifsioc+0x5fc/0x7f0 [ 351.750097] ? dev_ifsioc+0x5fc/0x7f0 [ 351.753895] ? dev_ifname+0x100/0x100 [ 351.757967] dev_ioctl+0x4b7/0xcb0 [ 351.761513] ? trace_hardirqs_on_caller+0x400/0x590 [ 351.766538] ? dev_load+0x1b0/0x1b0 [ 351.770178] ? check_preemption_disabled+0x3c/0x250 [ 351.775199] ? retint_kernel+0x2d/0x2d [ 351.779104] sock_ioctl+0x170/0x470 [ 351.782732] ? sock_ioctl+0x170/0x470 [ 351.786538] ? dlci_ioctl_set+0x40/0x40 [ 351.790512] do_vfs_ioctl+0x7ae/0x1060 [ 351.794402] ? selinux_file_mprotect+0x5d0/0x5d0 [ 351.799162] ? lock_downgrade+0x740/0x740 [ 351.803314] ? ioctl_preallocate+0x1c0/0x1c0 [ 351.807730] ? __fget+0x237/0x370 [ 351.811194] ? security_file_ioctl+0x89/0xb0 [ 351.815607] SyS_ioctl+0x8f/0xc0 [ 351.818974] ? do_vfs_ioctl+0x1060/0x1060 [ 351.823130] do_syscall_64+0x1e8/0x640 [ 351.827018] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.831878] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.837069] RIP: 0033:0x459a59 [ 351.840267] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 351.847978] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 351.855252] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 351.862767] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 351.870044] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 351.877323] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 [ 351.895916] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 18:51:36 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x8c401, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) close(r1) inotify_init1(0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 18:51:36 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:36 executing program 1 (fault-call:13 fault-nth:6): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r1, &(0x7f0000000300)='\x00', 0x1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000100)) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000040)=0x79141c0000000000, 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x7) fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r1) 18:51:36 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x5b7}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) sched_setattr(0x0, 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000140)={{0x2, 0x4e22, @multicast1}, {0x306}, 0x6c, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 'ip_vti0\x00'}) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r6) r7 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x200100) setsockopt$inet6_dccp_int(r7, 0x21, 0x8, &(0x7f0000000240)=0x9, 0x4) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r8, 0x0, 0x0) lseek(r8, 0xfffffffffffffffe, 0x1) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r8, 0x111, 0x2, 0x0, 0x4) 18:51:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000001580)='/dev/admmidi#\x00', 0x9, 0x49a443) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0xfffffffa, 0x4) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000002840)={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty}, 0x8) socket$kcm(0xa, 0x2, 0x11) syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) r1 = socket$netlink(0x10, 0x3, 0x13) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f00000000c0)={0xfe, &(0x7f00000016c0)="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"}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r3}]]}}}]}, 0x38}}, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f00000002c0)=""/199) [ 353.497690] FAULT_INJECTION: forcing a failure. [ 353.497690] name failslab, interval 1, probability 0, space 0, times 0 [ 353.531175] CPU: 1 PID: 13996 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 353.538236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.550292] Call Trace: [ 353.552895] dump_stack+0x138/0x197 [ 353.556638] should_fail.cold+0x10f/0x159 [ 353.560799] should_failslab+0xdb/0x130 [ 353.564782] kmem_cache_alloc_trace+0x2e9/0x790 [ 353.569464] device_private_init+0x4a/0x190 [ 353.573785] device_add+0xd1a/0x1490 [ 353.573799] ? device_initialize+0x430/0x430 [ 353.573818] ? device_private_init+0x190/0x190 [ 353.573840] netdev_register_kobject+0x183/0x3a0 [ 353.573859] register_netdevice+0x814/0xca0 [ 353.581994] ? netdev_change_features+0x80/0x80 [ 353.582017] ip6_tnl_create2+0x171/0x2c0 [ 353.582030] ip6_tnl_locate+0x549/0x7e0 [ 353.582041] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 353.582056] ip6_tnl_ioctl+0x3b1/0x920 [ 353.582070] ? ip6_tnl_locate+0x7e0/0x7e0 [ 353.582081] ? __mutex_lock+0x36a/0x1470 [ 353.582097] ? retint_kernel+0x2d/0x2d [ 353.582122] ? ip6_tnl_locate+0x7e0/0x7e0 [ 353.582132] dev_ifsioc+0x5fc/0x7f0 [ 353.582143] ? dev_ifsioc+0x5fc/0x7f0 [ 353.640147] ? dev_ifname+0x100/0x100 [ 353.643935] dev_ioctl+0x4b7/0xcb0 [ 353.647462] ? dev_load+0x1b0/0x1b0 [ 353.651082] ? trace_hardirqs_on_caller+0x400/0x590 [ 353.656101] ? __might_sleep+0x93/0xb0 [ 353.660146] sock_ioctl+0x170/0x470 [ 353.663754] ? sock_ioctl+0x170/0x470 [ 353.667546] ? dlci_ioctl_set+0x40/0x40 [ 353.671506] do_vfs_ioctl+0x7ae/0x1060 [ 353.675377] ? selinux_file_mprotect+0x5d0/0x5d0 [ 353.680116] ? lock_downgrade+0x740/0x740 [ 353.684249] ? ioctl_preallocate+0x1c0/0x1c0 [ 353.688643] ? __fget+0x237/0x370 [ 353.692099] ? security_file_ioctl+0x89/0xb0 [ 353.696494] SyS_ioctl+0x8f/0xc0 [ 353.699843] ? do_vfs_ioctl+0x1060/0x1060 [ 353.703977] do_syscall_64+0x1e8/0x640 [ 353.707857] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.712690] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.717861] RIP: 0033:0x459a59 [ 353.721043] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 353.728826] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 353.736098] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 18:51:37 executing program 3: gettid() msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000580)=""/108, 0x6c}], 0x2) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)='./file1/file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="0e005cdc7280794b505bb29c21ab198d06860000060000001d1031b5339847c937dbb47c678cfdfcd5f8b5597b7f20feddc749b1c491613fb4b899a617db5de01df419aefc0daad8b0add986a6b62fec01f7a25bf1800a1edafb8ae9272d22d3cc6d9e7edbd49ab849b6dc00"/123], 0x1e) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f776572b769723d2e3a66696c65302c776f526b6469723d2e2f66696c6531"]) link(&(0x7f00000001c0)='./file1/file0\x00', &(0x7f0000000240)='./file2\x00') lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file1/file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x2000, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000200)) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="6d657461636f70793d6f6e2c696e646578396f66662c64656661756c745f7065726d697333a356713d2773696f6e732c6e66735f6558706f72743d6f66662c6e4a735f6578706f72743d6f66662c704a72a34a855bae04168b806d69745f646972586374696f2c6f626a6f7c515fe97c019a5f757365733d"]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffe30, 0xfa00, {0x0, &(0x7f00000000c0), 0x0, 0x2}}, 0x297) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000a40)=ANY=[]) close(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/icm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {0x0, 0x3, {0xa, 0x4e23, 0xfffffffd, @ipv4={[], [], @broadcast}}, r2}}, 0x38) openat$vfio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vfio/vfio\x00', 0x50800, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0xfffffffffffffcf7) sendto$isdn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x22, 0x1, 0x7, 0x1f, 0x5}, 0x6) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) accept4$unix(r3, &(0x7f0000000480)=@abs, &(0x7f0000000500)=0x6e, 0x80000) openat(0xffffffffffffffff, &(0x7f00000006c0)='./file2\x00', 0x80000, 0x2) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x38d00c92cff06ac5, &(0x7f0000000140)=""/170, 0x0) [ 353.743356] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 353.750614] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 353.757872] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 18:51:37 executing program 0: socket(0x11, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') bind$alg(r1, &(0x7f0000466000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r3 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) dup(r0) syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r4 = gettid() tkill(r4, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x1, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r9 = openat$null(0xffffffffffffff9c, 0x0, 0x20000, 0x0) ioctl$VIDIOC_S_FMT(r9, 0xc0d05605, &(0x7f00000002c0)={0x2, @sdr={0x0, 0xfffffffb}}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000002c0)=ANY=[]) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)=' ', 0x64c8, 0x3, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYRES32, @ANYRES32, @ANYPTR64, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES32=r9]], 0x5}, 0x1, 0x0, 0x0, 0x40}, 0x0) 18:51:37 executing program 1 (fault-call:13 fault-nth:7): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x0, 0xe3}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000040)=@llc={0x1a, 0x30f02711b1308697, 0x0, 0x40, 0x4, 0x7, @broadcast}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)}, {&(0x7f0000000180)}, {&(0x7f00000002c0)="4b7dff13eaffbffdf5dbef03b25ae50d8bd50851fb485249e96ad24dcf81f148238053a13755a0b2b2b51c7e7d4ee75c967e1bc153babdfd2308f69deb17e4c6e402d639f84420ef356ad3256a67783cf1ec3490267f3babb50fc457e843ecab4ed2f0", 0x63}, {&(0x7f0000000580)="7864ba4fea98fe96a36bb86afe3a9c86f00436008a42ae71de5d332b218ef70a018fb9e7f2a831d9726dc98abab7cfe6199c2d93117f32e9c19085e65ee261e251143988b393c8f93d6ac39e1d70bf992e570deee512a4fd854f2da827434d8a040df9c8a3aae0b642455f15a4cb171d95d888ea02251122cae0ef1c3581f3aac1c2020b7d79760520fbfd94cbe9596b19ae67a164b342dc9f38f8978a7e6c81019dd6cfa50fa1510be01df2767b", 0xae}], 0x4, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], 0x1010}, 0xf94e83a3c76386b4) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) r5 = dup3(r4, 0xffffffffffffffff, 0x80000) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\x84\xe0\xda\x82a\xbe\x18O\x17\x1b\\\x143\x06v\x9b=>\xc1\xd9\x06\x00\x05\xf7\xae\xce\xbeA,j5\xac\xf5\xf0&\xc5$\x951QC\x87\x9f\xe0};\xac\xb7k>0\xce\xcd~\xd766*\fo=Cg&[\x8b\xe2\xbd\xe9\x16\xc6\x1e\x97e]\xb0\xed\xe7I\x18\x96RS\x10\x8cyr\xb7\xcf', 0x275a, 0x0) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000100)={0xfffffffffffffffb, 0x26, 0x20}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:51:37 executing program 0: perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) syz_open_dev$ndb(0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x4000, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @ipv4={[], [], @empty}, 0xd549}, 0x1c) syz_open_dev$dspn(0x0, 0xd911, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x100, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000440)='\x00\x00\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 354.057280] devpts: called with bogus options [ 354.131191] overlayfs: unrecognized mount option "lower·ir=.:file0" or missing value [ 354.143095] FAULT_INJECTION: forcing a failure. [ 354.143095] name failslab, interval 1, probability 0, space 0, times 0 [ 354.159323] overlayfs: unrecognized mount option "metacopy=on" or missing value [ 354.175233] CPU: 1 PID: 14028 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 354.182291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.191653] Call Trace: [ 354.193947] block nbd0: Receive control failed (result -22) [ 354.194256] dump_stack+0x138/0x197 [ 354.194275] should_fail.cold+0x10f/0x159 [ 354.203603] should_failslab+0xdb/0x130 [ 354.203623] __kmalloc_track_caller+0x2ec/0x790 [ 354.203635] ? retint_kernel+0x2d/0x2d [ 354.203646] ? kstrdup_const+0x48/0x60 [ 354.203658] kstrdup+0x3a/0x70 [ 354.203668] kstrdup_const+0x48/0x60 [ 354.203679] __kernfs_new_node+0x2f/0x420 [ 354.203694] kernfs_new_node+0x80/0xf0 [ 354.203709] kernfs_create_dir_ns+0x41/0x140 [ 354.203720] sysfs_create_dir_ns+0xbe/0x1d0 [ 354.203736] kobject_add_internal.part.0.cold+0x114/0x5ae [ 354.203759] kobject_add+0x11f/0x180 [ 354.203769] ? kset_create_and_add+0x180/0x180 [ 354.203783] ? mutex_unlock+0xd/0x10 [ 354.212084] device_add+0x383/0x1490 [ 354.212098] ? device_initialize+0x430/0x430 [ 354.212111] ? device_private_init+0x190/0x190 [ 354.212122] ? device_initialize+0x2e6/0x430 [ 354.212145] netdev_register_kobject+0x183/0x3a0 [ 354.212161] register_netdevice+0x814/0xca0 [ 354.212174] ? netdev_change_features+0x80/0x80 [ 354.212193] ip6_tnl_create2+0x171/0x2c0 [ 354.212204] ip6_tnl_locate+0x549/0x7e0 [ 354.212218] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 354.212236] ip6_tnl_ioctl+0x3b1/0x920 [ 354.212257] ? ip6_tnl_locate+0x7e0/0x7e0 [ 354.248691] nbd0: detected capacity change from 0 to 7168 [ 354.253813] ? __mutex_lock+0x36a/0x1470 [ 354.253851] ? ip6_tnl_locate+0x7e0/0x7e0 [ 354.253863] dev_ifsioc+0x5fc/0x7f0 [ 354.253872] ? dev_ifsioc+0x5fc/0x7f0 [ 354.253882] ? dev_ifname+0x100/0x100 [ 354.253900] dev_ioctl+0x4b7/0xcb0 [ 354.261475] block nbd0: Attempted send on invalid socket [ 354.262390] ? dev_load+0x1b0/0x1b0 [ 354.262408] ? trace_hardirqs_on_caller+0x400/0x590 [ 354.262424] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 354.266269] block nbd0: shutting down sockets [ 354.270067] sock_ioctl+0x170/0x470 [ 354.270076] ? sock_ioctl+0x170/0x470 [ 354.270087] ? dlci_ioctl_set+0x40/0x40 [ 354.270098] do_vfs_ioctl+0x7ae/0x1060 [ 354.270112] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 354.274763] print_req_error: 6 callbacks suppressed [ 354.274771] print_req_error: I/O error, dev nbd0, sector 0 [ 354.279150] ? ioctl_preallocate+0x1c0/0x1c0 [ 354.279165] ? check_preemption_disabled+0x3c/0x250 [ 354.284771] Buffer I/O error on dev nbd0, logical block 0, async page read [ 354.288374] ? retint_kernel+0x2d/0x2d [ 354.288398] ? security_file_ioctl+0x89/0xb0 18:51:37 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x250}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r2, 0x0, 0x0) io_submit(r2, 0x200000000000030c, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0xb15b, r1, &(0x7f00000001c0)="10000040060000000000000000000000b22025285db74192e7576d9062ec6e2fa5733f8ff248691861d03a71091d334252afb1af5b8f0274c2ed58338226131291198f3d70dcf797ac42d0eeed042c06b56b89f02f92b12ebe4c45948a362a76def2f4955f100a13131f474b140942110257e173cea102775e1b3873ebf98dac6421f6d449544114b8ce29f4b48d1738b5be127a96f24c9d3c130e1a6c2eb5b3f12eb6a1f5051594545cbb895e65d83c08d2d6cd56694e5a6c00f54aceaf498f57b2a56634a23ae7", 0x7, 0x3f}]) io_destroy(r2) utimes(&(0x7f0000000280)='./file0\x00', 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x1, 0x4) [ 354.294599] print_req_error: I/O error, dev nbd0, sector 2 [ 354.297364] SyS_ioctl+0x8f/0xc0 [ 354.297375] ? do_vfs_ioctl+0x1060/0x1060 [ 354.297390] do_syscall_64+0x1e8/0x640 [ 354.297400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.297418] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.297426] RIP: 0033:0x459a59 [ 354.297433] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 354.297445] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 354.297451] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 18:51:37 executing program 1 (fault-call:13 fault-nth:8): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 354.297463] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 354.301549] Buffer I/O error on dev nbd0, logical block 1, async page read [ 354.305986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 354.311035] print_req_error: I/O error, dev nbd0, sector 4 [ 354.314151] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 [ 354.335538] kobject_add_internal failed for ip6tnl1 (error: -12 parent: net) [ 354.336963] Buffer I/O error on dev nbd0, logical block 2, async page read [ 354.348485] overlayfs: unrecognized mount option "lower·ir=.:file0" or missing value [ 354.362808] print_req_error: I/O error, dev nbd0, sector 6 [ 354.372719] overlayfs: unrecognized mount option "metacopy=on" or missing value [ 354.404332] Buffer I/O error on dev nbd0, logical block 3, async page read [ 354.415337] print_req_error: I/O error, dev nbd0, sector 0 [ 354.424849] Buffer I/O error on dev nbd0, logical block 0, async page read [ 354.435154] Buffer I/O error on dev nbd0, logical block 1, async page read [ 354.561317] Buffer I/O error on dev nbd0, logical block 2, async page read [ 354.588247] Buffer I/O error on dev nbd0, logical block 3, async page read [ 354.596428] print_req_error: I/O error, dev nbd0, sector 0 [ 354.602315] Buffer I/O error on dev nbd0, logical block 0, async page read [ 354.609491] Buffer I/O error on dev nbd0, logical block 1, async page read [ 354.617525] print_req_error: I/O error, dev nbd0, sector 0 [ 354.624370] print_req_error: I/O error, dev nbd0, sector 0 18:51:38 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0xfffffffffffffec1) lseek(r0, 0xfffffffffffffffe, 0x1) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xca, 0x0, 0x100000, &(0x7f0000000140)=ANY=[@ANYRESHEX=0x0, @ANYPTR64]) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000180)={0x28, 0x2, 0x0, {0x6, 0x8, 0x6}}, 0x28) getdents64(r1, 0x0, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) sendto$netrom(r2, &(0x7f00000001c0)="8fd6beb23ac377db67aa87b7051a86fba4af4945aecea13fcfbe45ee0c397923de4b8bae086f25", 0x27, 0x4, &(0x7f0000000200)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) lseek(r1, 0xfffffffffffffffe, 0x1) uselib(&(0x7f0000000280)='./file0\x00') fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) [ 354.631419] print_req_error: I/O error, dev nbd0, sector 0 [ 354.638568] print_req_error: I/O error, dev nbd0, sector 0 [ 354.645705] ldm_validate_partition_table(): Disk read failed. [ 354.661663] Dev nbd0: unable to read RDB block 0 [ 354.670880] nbd0: unable to read partition table [ 354.680341] nbd0: partition table beyond EOD, truncated [ 354.758050] FAULT_INJECTION: forcing a failure. [ 354.758050] name failslab, interval 1, probability 0, space 0, times 0 [ 354.809153] CPU: 0 PID: 14045 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 354.816238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.825603] Call Trace: [ 354.828203] dump_stack+0x138/0x197 [ 354.831851] should_fail.cold+0x10f/0x159 [ 354.836013] should_failslab+0xdb/0x130 [ 354.839988] kmem_cache_alloc+0x2d7/0x780 [ 354.844186] ? memcpy+0x46/0x50 [ 354.847450] ? kstrdup+0x5a/0x70 [ 354.850817] __kernfs_new_node+0x70/0x420 [ 354.854969] kernfs_new_node+0x80/0xf0 [ 354.858865] kernfs_create_dir_ns+0x41/0x140 [ 354.863273] sysfs_create_dir_ns+0xbe/0x1d0 [ 354.867594] kobject_add_internal.part.0.cold+0x114/0x5ae [ 354.873146] kobject_add+0x11f/0x180 [ 354.876864] ? kset_create_and_add+0x180/0x180 [ 354.881551] ? mutex_unlock+0xd/0x10 [ 354.885300] device_add+0x383/0x1490 [ 354.889046] ? device_initialize+0x430/0x430 [ 354.893452] ? device_private_init+0x190/0x190 [ 354.898030] netdev_register_kobject+0x183/0x3a0 [ 354.902776] register_netdevice+0x814/0xca0 [ 354.907081] ? netdev_change_features+0x80/0x80 [ 354.911753] ip6_tnl_create2+0x171/0x2c0 [ 354.915815] ip6_tnl_locate+0x549/0x7e0 [ 354.919780] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 354.924197] ip6_tnl_ioctl+0x3b1/0x920 [ 354.928073] ? ip6_tnl_locate+0x7e0/0x7e0 [ 354.932213] ? __mutex_lock+0x36a/0x1470 [ 354.936274] ? SOFTIRQ_verbose+0x10/0x10 [ 354.940401] ? ip6_tnl_locate+0x7e0/0x7e0 [ 354.944529] dev_ifsioc+0x5fc/0x7f0 [ 354.948135] ? dev_ifsioc+0x5fc/0x7f0 [ 354.951927] ? dev_ifname+0x100/0x100 [ 354.955732] dev_ioctl+0x4b7/0xcb0 [ 354.959268] ? retint_kernel+0x2d/0x2d [ 354.963139] ? dev_load+0x1b0/0x1b0 [ 354.966763] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 354.971529] ? check_preemption_disabled+0x3c/0x250 [ 354.976549] ? retint_kernel+0x2d/0x2d [ 354.980429] sock_ioctl+0x170/0x470 [ 354.984036] ? sock_ioctl+0x170/0x470 [ 354.987825] ? dlci_ioctl_set+0x40/0x40 [ 354.991793] do_vfs_ioctl+0x7ae/0x1060 [ 354.995679] ? selinux_file_mprotect+0x5d0/0x5d0 [ 355.000423] ? ioctl_preallocate+0x1c0/0x1c0 [ 355.004816] ? __fget_light+0x19b/0x1f0 [ 355.008774] ? security_file_ioctl+0x89/0xb0 [ 355.013175] SyS_ioctl+0x8f/0xc0 [ 355.016533] ? do_vfs_ioctl+0x1060/0x1060 [ 355.020665] do_syscall_64+0x1e8/0x640 [ 355.024551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.029381] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.034567] RIP: 0033:0x459a59 [ 355.037856] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 355.045552] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 355.052814] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 355.060091] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 355.067347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 355.074703] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 [ 355.084667] kobject_add_internal failed for ip6tnl1 (error: -12 parent: net) 18:51:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:39 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x4000, 0x20}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a00)=ANY=[@ANYBLOB="440402002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea34f7f1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500010000000000000003000000f7aa8c786387119ffc2693fb8a4cb62cd187c29e8755323442ea4325756c69371d1b6ad91713102eafab6263337d7c0e24bc69b7cc9347b91415d93b96a548dbe7a076ec566736cc4ec36ba880cae118289424120b"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="24000000290001efe335bc0162268a0000000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 18:51:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x0, 0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) connect$ax25(0xffffffffffffffff, &(0x7f0000000240)={{0x3, @bcast}, [@bcast, @bcast, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640)}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') pivot_root(&(0x7f0000000340)='./file2\x00', 0x0) socket$caif_stream(0x25, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="000010200000c20419018304010801070000e063cbf631ca0b41c9b97803707273000000acc4f5d91cbc5f1aeb37ac93d3b060d9af7212d0615e"], 0x30) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000007c0)=ANY=[@ANYBLOB="000010200000c20419018304010801070000e063cbf631ca0b41c9b977fa0c37707273000000ec2e62851cbc5f1aeb37ac93d3b060d9af7212d0617ae0a99636e09fe341b1a937d807f1f512e17e581dd2a929f572162ea6f3b59c523e5112945ef800c447a629bb61c40cb5e3aab1013d26aa25ac7cf6d09e3286d1805906f735f0e7b20ca17f6f6dc8a2e8c1a712d239c0c20004b2ff44b7f7c674f781f5956985582b7554826d1d60f5cad72b0b298a444fe27c1b36d2f3457236f3e2a0c6c6d74966f53c97a6a7282109b3997c46deb1a3df5a586ac7040000003e05c2dcc7370c03526405f78da708fd6090e3c6d8851655d6234db7de93195ed8488ece78beb7c7f25814be44d413a009dcc1fb902dd2e279f2152a17465a34dd8c8875c22a5ffad05c7ad07ad412a7d04b33d2ba99cfdd55792c86ff8def62b53569a944f2279f9d0677"], 0x30) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000000)=@dstopts, 0x8) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000006c0)=0x200, 0x4) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000000)=ANY=[], 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000680)={0x4, 0x1, 0xd5, 0x0, 0x4}, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000380)=[{&(0x7f0000000d80)=""/4096, 0x1000}], 0x1, &(0x7f00000003c0)=""/115, 0x73}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000000b80)=""/47, 0x2f}, {&(0x7f0000000bc0)=""/90, 0x5a}, {0x0}], 0x3, &(0x7f0000002e00)=""/178, 0xb2}}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000004440)=""/2, 0x2}}, {{&(0x7f0000004480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006800)=[{&(0x7f0000005500)=""/238, 0xee}, {0x0}, {0x0}, {&(0x7f0000005740)=""/192, 0xc0}], 0x4, &(0x7f0000006880)=""/134, 0x86}, 0x2}, {{&(0x7f0000006940)=@alg, 0x80, &(0x7f0000006dc0)=[{&(0x7f00000069c0)=""/160, 0xa0}, {&(0x7f0000006a80)=""/36, 0x24}, {&(0x7f0000006b40)=""/202, 0xca}, {0x0}, {&(0x7f0000006cc0)=""/37, 0x25}, {&(0x7f0000006d00)=""/179, 0xb3}], 0x6}, 0xfffffffffffffffd}, {{0x0, 0x0, &(0x7f0000007500)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x4}, {{0x0, 0x0, 0x0}}], 0x8, 0x1, &(0x7f0000008b40)) chdir(&(0x7f0000000080)='./file1/file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') lsetxattr(0x0, &(0x7f0000000500)=@known='system.sockprotoname\x00', &(0x7f0000000600)='\x00', 0x1, 0x0) setxattr$security_ima(&(0x7f00000002c0)='./file1\x00', 0x0, &(0x7f0000007580)=@v2={0x0, 0x0, 0x1, 0x6e27}, 0xa, 0x2) 18:51:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x2c) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f00000004c0)=[{0x0, 0x0, 0x1a0}, {&(0x7f0000000500)='RDSK', 0x4}]) 18:51:39 executing program 3: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) open(&(0x7f00000000c0)='./file0\x00', 0x280881, 0x40) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000000)=0xfffffffa, 0x4) 18:51:39 executing program 1 (fault-call:13 fault-nth:9): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 356.589157] FAULT_INJECTION: forcing a failure. [ 356.589157] name failslab, interval 1, probability 0, space 0, times 0 [ 356.605359] CPU: 0 PID: 14065 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 356.612419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.621782] Call Trace: [ 356.624403] dump_stack+0x138/0x197 [ 356.628057] should_fail.cold+0x10f/0x159 [ 356.632224] should_failslab+0xdb/0x130 [ 356.636209] kmem_cache_alloc+0x2d7/0x780 [ 356.640621] ? trace_hardirqs_on_caller+0x400/0x590 [ 356.645646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 356.650419] __kernfs_new_node+0x70/0x420 [ 356.654577] kernfs_new_node+0x80/0xf0 [ 356.658644] __kernfs_create_file+0x46/0x323 [ 356.663042] sysfs_add_file_mode_ns+0x1e4/0x450 [ 356.667696] sysfs_create_file_ns+0x8e/0xb0 [ 356.672013] device_create_file+0xd7/0x110 [ 356.676241] ? acpi_bind_one+0x770/0x770 [ 356.680294] device_add+0x3be/0x1490 [ 356.684010] ? device_initialize+0x430/0x430 [ 356.688412] ? device_private_init+0x190/0x190 [ 356.693017] netdev_register_kobject+0x183/0x3a0 [ 356.697767] ? call_netdevice_notifiers_info+0x57/0x70 [ 356.703031] register_netdevice+0x814/0xca0 [ 356.707445] ? netdev_change_features+0x80/0x80 [ 356.712117] ip6_tnl_create2+0x171/0x2c0 [ 356.716173] ip6_tnl_locate+0x549/0x7e0 [ 356.720140] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 356.724454] ? check_memory_region+0xd0/0x190 [ 356.728953] ip6_tnl_ioctl+0x3b1/0x920 [ 356.732955] ? mark_held_locks+0xb1/0x100 [ 356.737179] ? ip6_tnl_locate+0x7e0/0x7e0 [ 356.741325] ? trace_hardirqs_on_caller+0x400/0x590 [ 356.746458] ? check_preemption_disabled+0x3c/0x250 [ 356.751489] ? ip6_tnl_locate+0x7e0/0x7e0 [ 356.755632] dev_ifsioc+0x5fc/0x7f0 [ 356.759248] ? dev_ifsioc+0x5fc/0x7f0 [ 356.763036] ? dev_ifname+0x100/0x100 [ 356.766835] dev_ioctl+0x4b7/0xcb0 [ 356.770385] ? dev_load+0x1b0/0x1b0 [ 356.774018] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 356.778875] ? check_preemption_disabled+0x3c/0x250 [ 356.783878] ? retint_kernel+0x2d/0x2d [ 356.787816] sock_ioctl+0x170/0x470 [ 356.791522] ? sock_ioctl+0x170/0x470 [ 356.795316] ? dlci_ioctl_set+0x40/0x40 [ 356.799273] do_vfs_ioctl+0x7ae/0x1060 [ 356.803146] ? selinux_file_mprotect+0x5d0/0x5d0 [ 356.807890] ? lock_downgrade+0x740/0x740 [ 356.812035] ? ioctl_preallocate+0x1c0/0x1c0 [ 356.816498] ? __fget+0x237/0x370 [ 356.819949] ? security_file_ioctl+0x89/0xb0 [ 356.824351] SyS_ioctl+0x8f/0xc0 [ 356.827777] ? do_vfs_ioctl+0x1060/0x1060 [ 356.831927] do_syscall_64+0x1e8/0x640 [ 356.835808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.840659] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 356.845841] RIP: 0033:0x459a59 [ 356.849021] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 356.857240] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 356.864505] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 356.871788] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 356.879088] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 356.886348] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 [ 356.902710] loop2: RDSK (0) [ 356.902710] unable to read partition table [ 356.907428] overlayfs: failed to resolve './file1': -2 [ 356.916127] loop2: partition table beyond EOD, truncated [ 356.929526] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 18:51:40 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0xff, 0x0) r2 = socket(0x0, 0xe0a3f188aa757bdc, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) bind$packet(r2, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) [ 356.938408] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14069 comm=syz-executor.4 18:51:40 executing program 1 (fault-call:13 fault-nth:10): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 356.994933] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14069 comm=syz-executor.4 [ 357.016592] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14069 comm=syz-executor.4 [ 357.037173] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14069 comm=syz-executor.4 18:51:40 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x8) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x216, 0x210007fd, &(0x7f0000000380)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f0000000540)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x204) shutdown(0xffffffffffffffff, 0x1) r1 = dup3(r0, r0, 0x80000) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x2800) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r3) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f0000000140)={@initdev, @dev, @initdev}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0xcc, &(0x7f00000003c0)=[@in6={0xa, 0x4e24, 0x0, @remote, 0xffffffff}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e22, 0x81, @remote, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x26}}, @in6={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x21}, 0x7ff}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e23, 0x100, @ipv4={[], [], @multicast2}, 0x4}, @in6={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in={0x2, 0x4e21, @empty}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000240)={r4, 0x7f}, 0x8) [ 357.089189] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14069 comm=syz-executor.4 18:51:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) read(r2, &(0x7f0000000140)=""/4, 0x4) socket$kcm(0x11, 0xa, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000, 0xfffffffffffffc1e}, 0xffffffffffffffea) [ 357.142058] FAULT_INJECTION: forcing a failure. [ 357.142058] name failslab, interval 1, probability 0, space 0, times 0 [ 357.154449] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14069 comm=syz-executor.4 [ 357.167673] CPU: 1 PID: 14085 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 357.174725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.184081] Call Trace: [ 357.184101] dump_stack+0x138/0x197 [ 357.184124] should_fail.cold+0x10f/0x159 [ 357.184140] should_failslab+0xdb/0x130 [ 357.184152] kmem_cache_alloc+0x2d7/0x780 [ 357.190372] ? find_held_lock+0x35/0x130 [ 357.190389] ? sysfs_do_create_link_sd.isra.0+0x82/0x120 [ 357.190404] __kernfs_new_node+0x70/0x420 [ 357.190419] kernfs_new_node+0x80/0xf0 [ 357.190432] kernfs_create_link+0x2c/0x170 [ 357.190443] sysfs_do_create_link_sd.isra.0+0x90/0x120 [ 357.190455] sysfs_create_link+0x65/0xc0 [ 357.234739] device_add+0x447/0x1490 [ 357.238469] ? device_private_init+0x190/0x190 [ 357.243067] netdev_register_kobject+0x183/0x3a0 [ 357.247842] register_netdevice+0x814/0xca0 [ 357.252181] ? netdev_change_features+0x80/0x80 [ 357.256862] ip6_tnl_create2+0x171/0x2c0 [ 357.260937] ip6_tnl_locate+0x549/0x7e0 [ 357.264925] ? __sanitizer_cov_trace_pc+0x41/0x60 [ 357.269780] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 357.274116] ? check_memory_region+0xd0/0x190 [ 357.279160] ip6_tnl_ioctl+0x3b1/0x920 [ 357.279177] ? ip6_tnl_locate+0x7e0/0x7e0 [ 357.279191] ? trace_hardirqs_on_caller+0x400/0x590 [ 357.279213] ? check_preemption_disabled+0x3c/0x250 [ 357.279234] ? ip6_tnl_locate+0x7e0/0x7e0 [ 357.301423] dev_ifsioc+0x5fc/0x7f0 [ 357.305072] ? dev_ifsioc+0x5fc/0x7f0 [ 357.308729] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14069 comm=syz-executor.4 [ 357.308878] ? dev_ifname+0x100/0x100 [ 357.322647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14069 comm=syz-executor.4 [ 357.324706] dev_ioctl+0x4b7/0xcb0 [ 357.324722] ? dev_load+0x1b0/0x1b0 [ 357.324737] ? trace_hardirqs_on_caller+0x400/0x590 [ 357.324764] ? __might_sleep+0x93/0xb0 [ 357.337743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14069 comm=syz-executor.4 [ 357.340327] sock_ioctl+0x170/0x470 [ 357.340337] ? sock_ioctl+0x170/0x470 [ 357.340350] ? dlci_ioctl_set+0x40/0x40 [ 357.340366] do_vfs_ioctl+0x7ae/0x1060 [ 357.340380] ? selinux_file_mprotect+0x5d0/0x5d0 [ 357.340392] ? lock_downgrade+0x740/0x740 [ 357.340402] ? ioctl_preallocate+0x1c0/0x1c0 [ 357.340415] ? __fget+0x237/0x370 [ 357.340433] ? security_file_ioctl+0x89/0xb0 [ 357.340446] SyS_ioctl+0x8f/0xc0 [ 357.340455] ? do_vfs_ioctl+0x1060/0x1060 [ 357.340471] do_syscall_64+0x1e8/0x640 [ 357.340479] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.340496] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.340506] RIP: 0033:0x459a59 [ 357.344710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14069 comm=syz-executor.4 18:51:40 executing program 1 (fault-call:13 fault-nth:11): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) readv(0xffffffffffffffff, &(0x7f0000395000)=[{0x0}], 0x1) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000340)) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) mount$9p_virtio(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x20, &(0x7f0000000280)={'trans=virtio,', {[{@access_any='access=any'}, {@uname={'uname'}}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}], [{@fowner_lt={'fowner<', r2}}, {@obj_role={'obj_role'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'eth0em0userwlan0#securityvboxnet1trusted'}}]}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x10000000003, 0x6) madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x8) [ 357.349118] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.349131] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 357.349137] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 357.349144] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 357.349151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 357.349157] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 [ 357.625273] FAULT_INJECTION: forcing a failure. [ 357.625273] name failslab, interval 1, probability 0, space 0, times 0 [ 357.647532] CPU: 0 PID: 14105 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 357.654581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.663930] Call Trace: [ 357.666508] dump_stack+0x138/0x197 [ 357.670131] should_fail.cold+0x10f/0x159 [ 357.674271] should_failslab+0xdb/0x130 [ 357.678231] __kmalloc_track_caller+0x2ec/0x790 [ 357.682889] ? save_trace+0x290/0x290 [ 357.686675] ? SOFTIRQ_verbose+0x10/0x10 [ 357.690718] ? kstrdup_const+0x48/0x60 [ 357.694600] kstrdup+0x3a/0x70 [ 357.697782] kstrdup_const+0x48/0x60 [ 357.701491] __kernfs_new_node+0x2f/0x420 [ 357.705628] kernfs_new_node+0x80/0xf0 [ 357.709507] kernfs_create_link+0x2c/0x170 [ 357.713741] sysfs_do_create_link_sd.isra.0+0x90/0x120 [ 357.719001] sysfs_create_link+0x65/0xc0 [ 357.723049] device_add+0x735/0x1490 [ 357.726750] ? device_private_init+0x190/0x190 [ 357.731334] ? netdev_register_kobject+0x17b/0x3a0 [ 357.736246] ? device_add+0x1/0x1490 [ 357.739944] netdev_register_kobject+0x183/0x3a0 [ 357.744689] register_netdevice+0x814/0xca0 [ 357.749018] ? netdev_change_features+0x80/0x80 [ 357.753699] ip6_tnl_create2+0x171/0x2c0 [ 357.757751] ip6_tnl_locate+0x549/0x7e0 [ 357.761716] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 357.766031] ? check_memory_region+0xd0/0x190 [ 357.770520] ip6_tnl_ioctl+0x3b1/0x920 [ 357.774400] ? ip6_tnl_locate+0x7e0/0x7e0 [ 357.778551] ? ip6_tnl_locate+0x7e0/0x7e0 [ 357.782683] dev_ifsioc+0x5fc/0x7f0 [ 357.786293] ? dev_ifsioc+0x5fc/0x7f0 [ 357.790080] ? dev_ifname+0x100/0x100 [ 357.793866] dev_ioctl+0x4b7/0xcb0 [ 357.797390] ? dev_load+0x1b0/0x1b0 [ 357.801002] ? check_preemption_disabled+0x3c/0x250 [ 357.806006] ? perf_trace_lock+0x109/0x500 [ 357.810234] ? __might_sleep+0x93/0xb0 [ 357.814106] sock_ioctl+0x170/0x470 [ 357.817712] ? sock_ioctl+0x170/0x470 [ 357.821498] ? dlci_ioctl_set+0x40/0x40 [ 357.825455] do_vfs_ioctl+0x7ae/0x1060 [ 357.829332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 357.834069] ? ioctl_preallocate+0x1c0/0x1c0 [ 357.838462] ? check_preemption_disabled+0x3c/0x250 [ 357.843482] ? retint_kernel+0x2d/0x2d [ 357.847373] ? security_file_ioctl+0x89/0xb0 [ 357.851805] SyS_ioctl+0x8f/0xc0 [ 357.855164] ? do_vfs_ioctl+0x1060/0x1060 [ 357.859307] do_syscall_64+0x1e8/0x640 [ 357.863177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.868012] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.873186] RIP: 0033:0x459a59 [ 357.876358] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.884050] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 357.891303] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 357.898556] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 357.905813] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 357.913095] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 18:51:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000640), 0x1000) unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x77db}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000040)={0x0, 0x3000, 0x0, 0x8}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ftruncate(r2, 0x2) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r3) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r4, 0x800c6613, &(0x7f00000001c0)=@v2={0x2, @aes256, 0x2, [], "552f92ab3c40ef6741f7726917eeb965"}) r5 = request_key(&(0x7f0000000080)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='\x00', r3) keyctl$revoke(0x3, r5) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 18:51:43 executing program 0: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3f) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$cont(0x9, r4, 0x0, 0x28) r5 = getpgid(r4) timer_create(0x2, &(0x7f0000000100)={0x0, 0x1d, 0x1, @tid=r5}, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/195, 0xff34}, {&(0x7f0000000300)=""/204, 0xcc}], 0x2) 18:51:43 executing program 3: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x10010009, 0xffffffffffffffff}) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, 0x0, 0x400, 0xfff, r1) 18:51:43 executing program 1 (fault-call:13 fault-nth:12): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:43 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='nls=m']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='dctcp-reno\x00', 0xb) 18:51:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x5}, 0x20) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x105, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000000), 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) connect$pppoe(r3, &(0x7f0000000000)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'ip6_vti0\x00'}}, 0x1e) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x3}, 0x4) [ 359.611115] hfsplus: unable to load nls mapping "m" [ 359.616358] hfsplus: unable to parse mount options [ 359.651143] audit: type=1400 audit(1570387903.129:182): avc: denied { ioctl } for pid=14114 comm="syz-executor.2" path="socket:[55052]" dev="sockfs" ino=55052 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 359.687460] FAULT_INJECTION: forcing a failure. [ 359.687460] name failslab, interval 1, probability 0, space 0, times 0 [ 359.704528] CPU: 0 PID: 14122 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 359.711581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.721145] Call Trace: [ 359.723734] dump_stack+0x138/0x197 [ 359.723754] should_fail.cold+0x10f/0x159 [ 359.723770] should_failslab+0xdb/0x130 [ 359.731532] kmem_cache_alloc+0x2d7/0x780 [ 359.731546] ? kstrdup_const+0x50/0x60 [ 359.731555] ? kstrdup_const+0x50/0x60 [ 359.731571] __kernfs_new_node+0x70/0x420 [ 359.731585] kernfs_new_node+0x80/0xf0 [ 359.731598] kernfs_create_link+0x2c/0x170 [ 359.731608] sysfs_do_create_link_sd.isra.0+0x90/0x120 [ 359.731621] sysfs_create_link+0x65/0xc0 [ 359.731634] device_add+0x735/0x1490 [ 359.731650] ? device_private_init+0x190/0x190 [ 359.731670] netdev_register_kobject+0x183/0x3a0 [ 359.731688] register_netdevice+0x814/0xca0 [ 359.755803] hfsplus: unable to load nls mapping "m" [ 359.759920] ? netdev_change_features+0x80/0x80 [ 359.759943] ip6_tnl_create2+0x171/0x2c0 [ 359.775365] hfsplus: unable to parse mount options [ 359.777938] ip6_tnl_locate+0x549/0x7e0 [ 359.777955] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 359.777971] ip6_tnl_ioctl+0x3b1/0x920 [ 359.817779] ? ip6_tnl_locate+0x7e0/0x7e0 [ 359.821928] ? trace_hardirqs_on_caller+0x400/0x590 [ 359.826943] ? check_preemption_disabled+0x3c/0x250 [ 359.831971] ? ip6_tnl_locate+0x7e0/0x7e0 [ 359.836210] dev_ifsioc+0x5fc/0x7f0 [ 359.839828] ? dev_ifsioc+0x5fc/0x7f0 [ 359.843624] ? dev_ifname+0x100/0x100 [ 359.847413] dev_ioctl+0x4b7/0xcb0 [ 359.850949] ? dev_load+0x1b0/0x1b0 [ 359.854589] ? check_preemption_disabled+0x3c/0x250 [ 359.859642] ? perf_trace_lock+0x109/0x500 [ 359.863870] ? __might_sleep+0x93/0xb0 [ 359.867746] sock_ioctl+0x170/0x470 [ 359.871364] ? sock_ioctl+0x170/0x470 [ 359.875163] ? dlci_ioctl_set+0x40/0x40 [ 359.879125] do_vfs_ioctl+0x7ae/0x1060 [ 359.883011] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.887813] ? ioctl_preallocate+0x1c0/0x1c0 [ 359.892218] ? check_preemption_disabled+0x3c/0x250 [ 359.897284] ? retint_kernel+0x2d/0x2d [ 359.901186] SyS_ioctl+0x8f/0xc0 [ 359.904544] ? do_vfs_ioctl+0x1060/0x1060 [ 359.908708] do_syscall_64+0x1e8/0x640 [ 359.912611] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.917462] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.922647] RIP: 0033:0x459a59 [ 359.925830] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 359.933536] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 359.940910] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 359.948173] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 359.955524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 359.962787] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 18:51:43 executing program 3: ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="280000002200290800000000000000000400000014001100fe80734a19e800feffffff00000000aab31fbab998a739bdc0796f0000000041b64fd265b99667025aa497d52459d1e49a9d3d815b94e07f5938ee433f12bd911d2bfd7bebd847d824816cdf44e6328c048bc1a5ae94b30463cc61f6e29d6291ee2d62d31af27e0db487988f20b224d25a7ada7326a9689d0792ae9186cb0734cb15cfd0fc433d3fe4571d660612ae4d7fcf18fd9c8107538ba33e0d33230494a62f45779b349871bf078b1afc742c1b333e53ced0850a14ee90fcdb02f5ee8d352cdb35c691ec89"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x100000000000019d, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={0x0, 0xfddf, &(0x7f00000000c0)={&(0x7f0000000340)={0x14, r2, 0x701, 0x0, 0x0, {0x6, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x188, r2, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6be}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40000000}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x2, @mcast2, 0x40}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008044) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") 18:51:43 executing program 1 (fault-call:13 fault-nth:13): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 360.010660] bond0: Releasing backup interface bond_slave_1 18:51:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x600, 0x0, 0x0, 0xb2) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) accept4$x25(r2, &(0x7f0000000040)={0x9, @remote}, &(0x7f00000000c0)=0x12, 0x400) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KDADDIO(r3, 0xc0044dff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 18:51:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xb587}) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) dup(0xffffffffffffffff) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r4, 0x0, 0xedc0) [ 360.216778] FAULT_INJECTION: forcing a failure. [ 360.216778] name failslab, interval 1, probability 0, space 0, times 0 [ 360.271151] CPU: 0 PID: 14152 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 360.278210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.287577] Call Trace: [ 360.290190] dump_stack+0x138/0x197 [ 360.293839] should_fail.cold+0x10f/0x159 [ 360.298004] should_failslab+0xdb/0x130 [ 360.301981] kmem_cache_alloc+0x2d7/0x780 [ 360.306122] ? memcpy+0x46/0x50 [ 360.309402] ? kstrdup+0x5a/0x70 [ 360.312772] __kernfs_new_node+0x70/0x420 [ 360.316920] kernfs_new_node+0x80/0xf0 [ 360.321074] kernfs_create_link+0x2c/0x170 [ 360.325307] sysfs_do_create_link_sd.isra.0+0x90/0x120 [ 360.330582] sysfs_create_link+0x65/0xc0 [ 360.334636] device_add+0x735/0x1490 [ 360.338352] ? device_private_init+0x190/0x190 [ 360.342935] netdev_register_kobject+0x183/0x3a0 [ 360.347688] register_netdevice+0x814/0xca0 [ 360.352010] ? netdev_change_features+0x80/0x80 [ 360.356693] ip6_tnl_create2+0x171/0x2c0 [ 360.360755] ip6_tnl_locate+0x549/0x7e0 [ 360.364726] ? __sanitizer_cov_trace_pc+0x29/0x60 [ 360.369568] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 360.373884] ? check_memory_region+0xd0/0x190 [ 360.378374] ip6_tnl_ioctl+0x3b1/0x920 [ 360.382264] ? ip6_tnl_locate+0x7e0/0x7e0 [ 360.386522] ? trace_hardirqs_on_caller+0x400/0x590 [ 360.391547] ? ip6_tnl_locate+0x7e0/0x7e0 [ 360.395691] dev_ifsioc+0x5fc/0x7f0 [ 360.399309] ? dev_ifsioc+0x5fc/0x7f0 [ 360.403104] ? dev_ifname+0x100/0x100 [ 360.406905] ? mutex_lock_nested+0x16/0x20 [ 360.411135] dev_ioctl+0x4b7/0xcb0 [ 360.414675] ? retint_kernel+0x2d/0x2d [ 360.418565] ? dev_load+0x1b0/0x1b0 [ 360.422188] ? trace_hardirqs_on_caller+0x400/0x590 [ 360.427200] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.432044] ? check_preemption_disabled+0x3c/0x250 [ 360.437065] sock_ioctl+0x170/0x470 [ 360.440685] ? sock_ioctl+0x170/0x470 [ 360.444479] ? dlci_ioctl_set+0x40/0x40 [ 360.448447] do_vfs_ioctl+0x7ae/0x1060 [ 360.452332] ? selinux_file_mprotect+0x5d0/0x5d0 [ 360.457089] ? lock_downgrade+0x740/0x740 [ 360.461234] ? ioctl_preallocate+0x1c0/0x1c0 [ 360.465641] ? __fget+0x237/0x370 [ 360.469106] ? security_file_ioctl+0x89/0xb0 [ 360.473517] SyS_ioctl+0x8f/0xc0 [ 360.476877] ? do_vfs_ioctl+0x1060/0x1060 [ 360.481025] do_syscall_64+0x1e8/0x640 [ 360.484906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.489762] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.494944] RIP: 0033:0x459a59 [ 360.498126] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 360.505830] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 360.513617] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 18:51:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 360.520881] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 360.528149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 360.535422] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 18:51:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() close(0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x3, r0, 0x3) recvmsg$kcm(r0, 0x0, 0x10100) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(0xffffffffffffffff, &(0x7f000001c640)={&(0x7f000001bdc0)=@can, 0x80, &(0x7f000001c4c0)=[{&(0x7f000001c3c0)}], 0x1}, 0x4000) 18:51:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xb587}) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) dup(0xffffffffffffffff) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r4, 0x0, 0xedc0) 18:51:44 executing program 0: setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{}, "1ef50b76d02a7ced", "195cf20593a8ee113f19538d648a2e49", "77ac902e", "cd3bae7cc9ee7408"}, 0x28) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x49, 0x0, 0x366) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:51:44 executing program 1 (fault-call:13 fault-nth:14): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 360.828110] FAULT_INJECTION: forcing a failure. [ 360.828110] name failslab, interval 1, probability 0, space 0, times 0 [ 360.849529] CPU: 1 PID: 14187 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 360.856585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.865954] Call Trace: [ 360.868563] dump_stack+0x138/0x197 [ 360.872217] should_fail.cold+0x10f/0x159 [ 360.876390] should_failslab+0xdb/0x130 [ 360.880385] kmem_cache_alloc+0x2d7/0x780 [ 360.884551] ? trace_hardirqs_on_caller+0x400/0x590 [ 360.889588] __kernfs_new_node+0x70/0x420 [ 360.893755] kernfs_new_node+0x80/0xf0 [ 360.897664] __kernfs_create_file+0x46/0x323 [ 360.902095] sysfs_add_file_mode_ns+0x1e4/0x450 [ 360.906789] internal_create_group+0x232/0x7b0 [ 360.911399] sysfs_create_groups+0x97/0x140 [ 360.915744] device_add+0x7d8/0x1490 [ 360.919479] ? device_private_init+0x190/0x190 [ 360.924089] netdev_register_kobject+0x183/0x3a0 [ 360.928861] register_netdevice+0x814/0xca0 [ 360.933196] ? netdev_change_features+0x80/0x80 [ 360.937883] ip6_tnl_create2+0x171/0x2c0 [ 360.941952] ip6_tnl_locate+0x549/0x7e0 [ 360.945938] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 360.950274] ip6_tnl_ioctl+0x3b1/0x920 [ 360.954174] ? ip6_tnl_locate+0x7e0/0x7e0 [ 360.958340] ? trace_hardirqs_on_caller+0x400/0x590 [ 360.963377] ? check_preemption_disabled+0x3c/0x250 [ 360.968413] ? ip6_tnl_locate+0x7e0/0x7e0 [ 360.972567] dev_ifsioc+0x5fc/0x7f0 18:51:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) flock(r1, 0x5) fcntl$setstatus(r0, 0x4, 0x2000) geteuid() setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000002c0), 0x0) r2 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) [ 360.976289] ? dev_ifsioc+0x5fc/0x7f0 [ 360.980106] ? dev_ifname+0x100/0x100 [ 360.983919] dev_ioctl+0x4b7/0xcb0 [ 360.987465] ? retint_kernel+0x2d/0x2d [ 360.991360] ? dev_load+0x1b0/0x1b0 [ 360.994995] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.999763] ? check_preemption_disabled+0x3c/0x250 [ 361.004785] ? retint_kernel+0x2d/0x2d [ 361.008687] sock_ioctl+0x170/0x470 [ 361.008698] ? sock_ioctl+0x170/0x470 [ 361.008709] ? dlci_ioctl_set+0x40/0x40 [ 361.008720] do_vfs_ioctl+0x7ae/0x1060 [ 361.008733] ? selinux_file_mprotect+0x5d0/0x5d0 [ 361.023981] ? lock_downgrade+0x740/0x740 [ 361.023998] ? ioctl_preallocate+0x1c0/0x1c0 [ 361.024012] ? __fget+0x237/0x370 [ 361.024035] ? security_file_ioctl+0x89/0xb0 [ 361.024048] SyS_ioctl+0x8f/0xc0 [ 361.024064] ? do_vfs_ioctl+0x1060/0x1060 [ 361.052663] do_syscall_64+0x1e8/0x640 [ 361.056601] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.061449] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.066625] RIP: 0033:0x459a59 [ 361.069808] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 361.077521] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 361.084785] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 361.092046] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 361.099320] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 361.106584] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 18:51:44 executing program 0: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0xa001) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000040)={0x7}, 0x7) syncfs(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) write$tun(r1, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1) 18:51:44 executing program 1 (fault-call:13 fault-nth:15): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:45 executing program 3: add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket(0x0, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f00000019c0)={0x0, r3}) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000200), 0x0, 0x80000) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xac, 0x0, 0x200, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x90, 0x17, {0xb, 0x0, @l2={'ib', 0x3a, 'B\xff\x0f\x00\x00\x00\xc1\xa6\xba\xcd\x95+\xda=e\xda\x7f\xfd\xea\xdc\xaf;\xbb BU\x1d^\xd5`\r\xbey#\xaf\xc9\xf4\x9a\xe8\x89\xc3\x92\v/z\xc7\xb6c\xb3z\x85\x9f\x1d\x9c\x8e\xf4\x02\'\xaa\x96>\x87\x9f\xb4>vQ\xf6\xf1\xaam\x8b\xd4\x92\x19\xafV\x1f\xb1k\r{-\x98\xe1u\xc6H\xec\x1b\x0f[\xd0\xc0\xd5\xbev~\xd8Br\xaf\x82\xe4\x8d<\x9d\xb1\xb50\xc1\x0e\x81$\x88\xf4\nj,K\xc0\xc0\x18\xdaS$Rs'}}}}, ["", ""]}, 0xac}}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) dup3(r0, r5, 0x80000) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x4e20, @remote}, {0x6, @random="922e4b109664"}, 0x54a0817cf143b849, {0x2, 0x4e23, @multicast1}, 'veth0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[]}}, 0x0) sendmmsg(r6, &(0x7f0000000180), 0x400000000000282, 0x0) 18:51:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 361.508369] FAULT_INJECTION: forcing a failure. [ 361.508369] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 361.520318] CPU: 0 PID: 14199 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 361.527334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.536694] Call Trace: [ 361.539289] dump_stack+0x138/0x197 [ 361.542934] should_fail.cold+0x10f/0x159 [ 361.547093] __alloc_pages_nodemask+0x1d6/0x7a0 [ 361.551771] ? __alloc_pages_slowpath+0x2930/0x2930 [ 361.556793] cache_grow_begin+0x80/0x400 [ 361.560856] kmem_cache_alloc+0x6a6/0x780 [ 361.565004] ? wait_for_completion+0x420/0x420 [ 361.569587] __kernfs_new_node+0x70/0x420 [ 361.573734] kernfs_new_node+0x80/0xf0 [ 361.577738] __kernfs_create_file+0x46/0x323 [ 361.582144] sysfs_add_file_mode_ns+0x1e4/0x450 [ 361.586825] internal_create_group+0x232/0x7b0 [ 361.591424] sysfs_create_groups+0x97/0x140 [ 361.595751] device_add+0x7d8/0x1490 [ 361.599463] ? device_private_init+0x190/0x190 [ 361.604045] netdev_register_kobject+0x183/0x3a0 [ 361.608807] register_netdevice+0x814/0xca0 [ 361.613114] ? netdev_change_features+0x80/0x80 [ 361.617816] ip6_tnl_create2+0x171/0x2c0 [ 361.621886] ip6_tnl_locate+0x549/0x7e0 [ 361.625864] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 361.630193] ip6_tnl_ioctl+0x3b1/0x920 [ 361.634156] ? ip6_tnl_locate+0x7e0/0x7e0 [ 361.638294] ? retint_kernel+0x2d/0x2d [ 361.642204] ? ip6_tnl_locate+0x7e0/0x7e0 [ 361.646353] dev_ifsioc+0x5fc/0x7f0 [ 361.649979] ? dev_ifsioc+0x5fc/0x7f0 [ 361.654205] ? dev_ifname+0x100/0x100 [ 361.658048] dev_ioctl+0x4b7/0xcb0 [ 361.661586] ? dev_load+0x1b0/0x1b0 [ 361.665300] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 361.670063] ? check_preemption_disabled+0x3c/0x250 [ 361.675070] ? retint_kernel+0x2d/0x2d [ 361.679032] sock_ioctl+0x170/0x470 [ 361.682649] ? sock_ioctl+0x170/0x470 [ 361.686452] ? dlci_ioctl_set+0x40/0x40 [ 361.690420] do_vfs_ioctl+0x7ae/0x1060 [ 361.694456] ? selinux_file_mprotect+0x5d0/0x5d0 [ 361.699196] ? lock_downgrade+0x740/0x740 [ 361.703341] ? ioctl_preallocate+0x1c0/0x1c0 [ 361.707745] ? __fget+0x237/0x370 [ 361.711203] ? security_file_ioctl+0x89/0xb0 [ 361.715600] SyS_ioctl+0x8f/0xc0 [ 361.718948] ? do_vfs_ioctl+0x1060/0x1060 [ 361.723094] do_syscall_64+0x1e8/0x640 [ 361.726985] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.731989] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.737182] RIP: 0033:0x459a59 [ 361.740366] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 361.748077] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 361.755335] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 361.762597] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 361.769868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 361.777232] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 18:51:45 executing program 0: socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7f, 0x800) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0x1001, 0x4, 0x80000000, 0x7}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') stat(0x0, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, 0x0, 0x0) execve(0x0, &(0x7f0000000900)=[0x0, 0x0, &(0x7f0000000780)='system\\&wlan1!\x00', 0x0, 0x0, 0x0], 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x400000, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000480)='127.0.0.1\x03', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x10, &(0x7f0000000580)={'trans=rdma,', {'port'}, 0x2c, {[{@rq={'rq'}}, {@rq={'rq'}}, {@sq={'sq'}}, {@common=@dfltgid={'dfltgid'}}, {@common=@uname={'uname'}}, {@common=@version_L='version=9p2000.L'}], [{@subj_type={'subj_type', 0x3d, 'keyring)'}}]}}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L+', 0xfffffffffffffffc}, 0x28, 0x1) 18:51:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) sendmmsg$inet(r1, &(0x7f00000024c0)=[{{&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000080)="2e6456b831be226e1a538f955e8b4e48fac524189372719d9d46da70d039d42c5ae8894ceb86167a0ea3", 0x2a}, {&(0x7f00000000c0)="a8e0afbc80dfd065cb73c0532078bb616304cd23704a7c149af73ce59ce0bfdcfd930998194bc17bc00a289a49cc8dec7cb4cd68295fb1a663a8dbd40d33ddde2509b080f97f97e74f702ee3bea621", 0x4f}, {&(0x7f0000000140)="9cb9bb82fef10a08cb9b89491c3298f399b1fecb4637d69ce970bca4775e3cffad7f548590cb67220962ccc1ede994b894fc19992a455293be1e409129ad307a5d158bdbeeb5e96f04183a22b576279ee60b9af8ef099ec2e56fe79d583b3600f2bad6356fd3b4e5ccd010aa522daf0ca9725c90389f7b9ecaa98302f04a37516b38a79146c0190ec62c061bf93a2b09c045459f8a7ec14793c69fce0af41a591d5c5e210b2f33953af7a346cc", 0xad}], 0x3, &(0x7f0000000240)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}], 0x18}}, {{&(0x7f0000000280)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000380)=[{&(0x7f00000002c0)="8d89e90988a9c1a1013405c613f7bc905aa30aa998f7a640f0c76e71fa11ebac9fc00ef72eefc387", 0x28}, {&(0x7f0000000340)="be990a4cf5103483a990c44981077df31aeb67aa6444649bb69d18cba741b644d01dfb671a", 0x25}], 0x2, &(0x7f00000003c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@noop, @ra={0x94, 0x6, 0x5}, @end, @cipso={0x86, 0xa, 0x9, [{0x6, 0x4, "5918"}]}, @timestamp={0x44, 0x8, 0x1, 0x0, 0x9, [{[], 0x7fffffff}]}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@timestamp={0x44, 0x28, 0x3c, 0x1, 0x2, [{[@loopback], 0x9}, {[], 0x5}, {[@dev={0xac, 0x14, 0x14, 0x1e}], 0x4e9}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x9}, {[], 0x8}, {}]}, @rr={0x7, 0x1f, 0x1, [@local, @loopback, @multicast2, @local, @broadcast, @local, @empty]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x59}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffff16}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xd0}}, {{&(0x7f00000004c0)={0x2, 0x4e21, @remote}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)}, {&(0x7f0000000540)="1353609a86280aae9ad2e6bf7579d8427dd42a00e92878c8562c62691ccb297bb2c9bd5d392d56328f39c2339513a55e1d3c5e55d19ec0fc5c32480e48e5f5d20b8b432676df13f162b63a74fabbcc75d805b8bc2e59792eac0fd9b51a9a10", 0x5f}, {&(0x7f00000005c0)="607457f78690379ed8c55a164c5819cd07694dd962009f18c242d6d2a5e5ff9cd93963e37b49e7d0015a83deb100d5341a6278fd722edd5728cec8158daa960c63a0e546a7f0ecf3faa79b825d74de5eae6ca289b9e693af5412b1029961f74c1e2b99875defbc0f63f2d9b133d681f7d43c7ac33526d57b0f5e955b5f3f5d17848216c2a0ae91999ef81fb46467d65a01f0be6fd985b84989894793dc8296c3a06b29cbca226d0e270c9e1823a2fedefce39c77734100060b8e51bb39f1504400311be263a4d21771a809a74aeac2468f5c2c4322718cac962055a1", 0xdc}], 0x3, &(0x7f0000000700)}}, {{&(0x7f0000000740)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000780)="a8caa9d96532e459ffc20f4166f0fa7b62b1d5edadd62b6ba41c85f86cfe387758a60fd2d746c2eb1828c53558106069edc4d65b4c23c8b61a83456afdac6482c7daebecc12d43f66571eab87a43a5b4e4212746c930302c256e839c4a78eb3c3099024e79339202e0fedffae326740440ac26751134595a66247d24c7bc657e701c12aabc8916390d26c8b099fbf4f095e7c125f935e9a00774b2aff66fbcfaf73a68db1ebcf6d9a58659134b6703dc5b7675fb5641681f3ef59b3adf84cf4589454eaefa22065c58fac7966c92d2913bd3c07738a8aa4c5d98380d5ba2d51638303d3603d1bac07dca66a7fa7bfb7840", 0xf1}], 0x1, &(0x7f00000008c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xbab0}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_retopts={{0x70, 0x0, 0x7, {[@generic={0x6a8a25e488e371ba, 0xf, "a715c38e8a1e523d74622e2ac2"}, @cipso={0x86, 0x36, 0xe1, [{0x7, 0xb, "31c8b01adaa5e67da5"}, {0xc99870969f607729, 0xe, "9c36d31f4142f5d3415da9bc"}, {0x1, 0xb, "e5a78da31bfb1d2e19"}, {0xb, 0xc, "db94d10922db085f5d64"}]}, @cipso={0x86, 0x19, 0x10000, [{0x0, 0x9, "47b71959f6405d"}, {0x0, 0xa, "7696886d8aec6d28"}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_retopts={{0x18, 0x0, 0x7, {[@generic={0x4f, 0x6, "045d7c31"}]}}}, @ip_retopts={{0x80, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x0, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @rr={0x7, 0x27, 0x1d, [@loopback, @empty, @loopback, @dev={0xac, 0x14, 0x14, 0xc}, @multicast1, @dev={0xac, 0x14, 0x14, 0x1a}, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x6, 0x8}, @end, @rr={0x7, 0x1b, 0x2, [@loopback, @multicast1, @rand_addr=0x8, @empty, @rand_addr=0x1, @broadcast]}, @rr={0x7, 0x1f, 0x2, [@rand_addr=0x100, @dev={0xac, 0x14, 0x14, 0x16}, @rand_addr=0x3, @loopback, @empty, @multicast1, @remote]}]}}}], 0x150}}, {{&(0x7f0000000a40)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000001ec0)=[{&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000001a80)="d5801b3e3460c400147e617d63e2f3b089b2554dca657d9bea69b4773cea3aa63318b1582bc143959f719c101fa5a28e6383a5b5462c3cc6f8373d0e2b895a74ff470f93d745f72b83d6f23528c02721f85bbe608d68d5798c3e1507854ef6eae5e69200d4b829fbb7b6cfd2a43e1f57a4fd7bc748dc173d51cab367b3f4ab826b227b694ab6fadb61a284f1de191d877d", 0x91}, {&(0x7f0000001b40)="07438fc9faff4788f8c92b3dc70fa017628d942ad3f688fa3b9225ae011b21d3fcbbdcad1c4f75e4e2a43a84e2d0d1efd1489e0169e7878b869c0f4c4f7d3280d42e694b97f86c9a138f2ed343d2fd5b2c2d364a819b2e512f7068dba7be3c3488e63abe02a747f709cfdfebe8f0326df05f0c73342023f8f9776ed08d1d8c02be46861c91f6e1e769d3b5d2da8425ba33b2752de52e26bf5a44d717f5cd7fe28653cbca4831c561621131ec3c897b94f0ba9898aa125e5fe784a619fef347000412fe3d2a58895d3545b6978cf897fc3f7852a0ef969fca9738f603", 0xdc}, {&(0x7f0000001c40)="cd85830f64bcd20c00833c42a3765f16b2fb21a032be14c3220b3916d802ec180dc72f76f0c6bfd575e7758ecd0500faf65cf1697e742d31f121a16a3cf56a30724ba8f38ea9df0b134a0ce5fa9edbec50481f44b3653684cb60930895eb1634950ef74152f0df765f2e8814cdbb", 0x6e}, {&(0x7f0000001cc0)="547d8caf3b688c9b2dcf4a85fb89a6e2fd42611e66cc8ff42376bf38fbdbcab85a12bd63ae6c53f09dc67346aed3459d4ea405d0f4e3ce6a59df9b492aef6787f439eed4023a3a5eb2f4db088be6f1ca349e2d610aedb584e5c0c3113fd78bbb9d1bbb0083b557f13e8629a807107d640e15d176371cec8b9d56157b9a19327b61c81213bc8cd5ec3f28f63f49e2466261bc143d09a30e", 0x97}, {&(0x7f0000001d80)="df291c1b5f9a8fc818afd659e32ca526cba5261b145ddf38e89869fc22eeac65ad1520117fef53bf5bfac7b8f5fd350e978628c361875e326af5bc8a35b640188c5022886a052b75a3aa4579b1b0516a6489f719a3342d605c967d189e38bf0b1573b7677f7f4c09d3a3f475d054784b1091c07db28ddae34687ae83f08564580d11959ba10870926d3514eec7ca874925c0531cafc67337c0dab324513695d74b561680c317e6eda66eb77c6f5507682ceac65d6f3bb65d8486cc6fd54deee1c71edb88421df76be9aefd383fe5f54d9b6a", 0xd2}, {&(0x7f0000001e80)="13a2d8dabda7caad60c11d", 0xb}], 0x7, &(0x7f0000001f40)=[@ip_ttl={{0x14, 0x0, 0x2, 0xfffffffc}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffff02}}, @ip_retopts={{0x44, 0x0, 0x7, {[@generic={0x82, 0x6, "733ec0f4"}, @timestamp={0x44, 0x10, 0x2, 0x0, 0xe, [{[], 0x7}, {[@local]}]}, @end, @timestamp={0x44, 0x1c, 0xf, 0x0, 0x4, [{[@empty], 0x1}, {[@broadcast]}, {[@local], 0x9c}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_retopts={{0xa8, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x3, [@empty]}, @cipso={0x86, 0x15, 0x19c, [{0x7, 0x8, "56ce921bab41"}, {0x6, 0x7, "cf7547aec2"}]}, @generic={0x7, 0x5, "191692"}, @rr={0x7, 0x7, 0x7, [@broadcast]}, @cipso={0x86, 0x4e, 0x10000, [{0x0, 0xd, "17141f0211d76c43c39c40"}, {0x0, 0x11, "38f0b1c99e6d366c4a15d10f273f97"}, {0x7, 0x4, "e7c0"}, {0x0, 0x9, "ee590a031d3867"}, {0x5, 0xf, "894f7b8c2d635bb48596469934"}, {0xdd1a2b88d88b2c7b, 0x5, '\'4c'}, {0x7, 0x9, "eb7de965c56ec5"}]}, @ra={0x94, 0x6}, @ssrr={0x89, 0xf, 0x7, [@local, @rand_addr=0x7ff, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x6, 0x8e}, @ra={0x94, 0x6, 0x1}]}}}], 0x138}}, {{&(0x7f0000002080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000002440)=[{&(0x7f00000020c0)="ed07af9753f96089ce18c53be3744c1465ba12283d5553392cf006c522215d15eedcfd9a37099fce5f3810b62ae5b7a1e9b1ba607f1f5bb83934f5fd6bacd63f67fc17ce30e70e1fec0429e0bfc8060abdc15258c720c7618d41d9f442d141e93a1e45ea96b42ab31fb88ae6cc3962550e6790c6d0537b3bf63bdd3f759b58434f693daf70b0bddf12259debc962dae2ca330c1f8353e9eeadf76473dacfa7ffcabc43dfde6e5b2a4afd5e498adbd2cd8e9e3e4257b5ac8175d9b3f560a89ee63aeead7b315022728a7aa0a8f5bdb9b937a3f958baccd6f2891caf033a646dae368856b492eb08faba", 0xe9}, {&(0x7f00000021c0)="d4313c02f0362d2706a995c44d6da5b895f973db6603e0c3984e173e791754961bcad9a2ef8462c47e5705882d663fe12ca55c31b86e588566fe4a4e0af05fa24037f9470f590c6002569689a355d40e9c18414902ca4d75a6bdf66ec067d6a5028323a7d112c573d8a3398dcaf56c3b64c11b0390101268830a0c6e860d01999543821443c67999b785eb46a87748e0d554743cb68cb909fbbce78916df49a9decc69eb5efaab7858e286a2f672f513327825d47b2dfdf7d74e5a020540b1d782591308ba7f9cb7f1053df12dc6c36d363b3ff3e4a3be40532f21ef44121a21ee4660890b4b269d2dfbee90a8f7c4b67a04e5f95185d1d4f6", 0xf9}, {&(0x7f00000022c0)="d94a69a3c6f3a77a6e25e160b7", 0xd}, {&(0x7f0000002300)="bd625b7939348bc5516bc35b8b625e1b5b9407da1fbb59af6490ff9b0ebf837b5f5ff52b632e92c41fd8ea283343f55adbc066eef15756181996b356ac999948d4c1a799735979323cf87ac1a92b3934b350d72baa9dc09c5f1802da6f72247589d914dd641c6c11ae81aa186c392d", 0x6f}, {&(0x7f0000002380)="3150afb0d680bda23850bed644385e8cd324bbf35871f14060b1a357534a7eb82d73c68df55eee70ec3828567520bd0bddb555b50bd1e776c8db5f670172a72052b5db3983e296cd86c4179fb0e844de34f3a9c4434d26ff6a326c1cb85da9b8ac90a698914e5b75698e94cf6b182a21528fbc478aaff348fa974debda00b546e28e1954e6b02d5da45528e08795043e", 0x90}], 0x5}}], 0x6, 0x20000000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'teql0\x00', 0x4005}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) close(r0) [ 362.004949] device sit0 entered promiscuous mode [ 362.167656] device sit0 left promiscuous mode 18:51:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lstat(0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@part={'part', 0x3d, 0x100000001}}], [{@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@hash='hash'}, {@smackfsfloor={'smackfsfloor'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic'}}, {@smackfshat={'smackfshat', 0x3d, 'hfs\x00'}}, {@dont_appraise='dont_appraise'}]}) 18:51:45 executing program 1 (fault-call:13 fault-nth:16): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:45 executing program 0: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @rand_addr=0x6e}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000700)="318533735b5bae", 0x7}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) [ 362.231193] device sit0 entered promiscuous mode 18:51:45 executing program 3: add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket(0x0, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f00000019c0)={0x0, r3}) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000200), 0x0, 0x80000) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xac, 0x0, 0x200, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x90, 0x17, {0xb, 0x0, @l2={'ib', 0x3a, 'B\xff\x0f\x00\x00\x00\xc1\xa6\xba\xcd\x95+\xda=e\xda\x7f\xfd\xea\xdc\xaf;\xbb BU\x1d^\xd5`\r\xbey#\xaf\xc9\xf4\x9a\xe8\x89\xc3\x92\v/z\xc7\xb6c\xb3z\x85\x9f\x1d\x9c\x8e\xf4\x02\'\xaa\x96>\x87\x9f\xb4>vQ\xf6\xf1\xaam\x8b\xd4\x92\x19\xafV\x1f\xb1k\r{-\x98\xe1u\xc6H\xec\x1b\x0f[\xd0\xc0\xd5\xbev~\xd8Br\xaf\x82\xe4\x8d<\x9d\xb1\xb50\xc1\x0e\x81$\x88\xf4\nj,K\xc0\xc0\x18\xdaS$Rs'}}}}, ["", ""]}, 0xac}}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) dup3(r0, r5, 0x80000) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x4e20, @remote}, {0x6, @random="922e4b109664"}, 0x54a0817cf143b849, {0x2, 0x4e23, @multicast1}, 'veth0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[]}}, 0x0) sendmmsg(r6, &(0x7f0000000180), 0x400000000000282, 0x0) [ 362.286079] FAULT_INJECTION: forcing a failure. [ 362.286079] name failslab, interval 1, probability 0, space 0, times 0 [ 362.327636] CPU: 0 PID: 14233 Comm: syz-executor.1 Not tainted 4.14.147 #0 [ 362.334697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.344078] Call Trace: [ 362.346681] dump_stack+0x138/0x197 [ 362.350335] should_fail.cold+0x10f/0x159 [ 362.354501] should_failslab+0xdb/0x130 [ 362.358491] kmem_cache_alloc+0x2d7/0x780 [ 362.362644] ? wait_for_completion+0x420/0x420 [ 362.367245] __kernfs_new_node+0x70/0x420 [ 362.371410] kernfs_new_node+0x80/0xf0 [ 362.375299] __kernfs_create_file+0x46/0x323 [ 362.379692] sysfs_add_file_mode_ns+0x1e4/0x450 [ 362.384351] internal_create_group+0x232/0x7b0 [ 362.388920] sysfs_create_groups+0x97/0x140 [ 362.393240] device_add+0x7d8/0x1490 [ 362.396961] ? device_private_init+0x190/0x190 [ 362.401556] netdev_register_kobject+0x183/0x3a0 [ 362.406412] register_netdevice+0x814/0xca0 [ 362.410732] ? netdev_change_features+0x80/0x80 [ 362.415412] ip6_tnl_create2+0x171/0x2c0 [ 362.419477] ip6_tnl_locate+0x549/0x7e0 [ 362.423450] ? ip6_tnl_init_net+0x6f0/0x6f0 [ 362.427765] ? check_memory_region+0xd0/0x190 [ 362.432258] ip6_tnl_ioctl+0x3b1/0x920 [ 362.436140] ? ip6_tnl_locate+0x7e0/0x7e0 [ 362.440292] ? __mutex_lock+0x36a/0x1470 [ 362.444436] ? SOFTIRQ_verbose+0x10/0x10 [ 362.448490] ? ip6_tnl_locate+0x7e0/0x7e0 [ 362.452636] dev_ifsioc+0x5fc/0x7f0 [ 362.456254] ? dev_ifsioc+0x5fc/0x7f0 [ 362.460051] ? dev_ifname+0x100/0x100 [ 362.463860] dev_ioctl+0x4b7/0xcb0 [ 362.467391] ? retint_kernel+0x2d/0x2d [ 362.471275] ? dev_load+0x1b0/0x1b0 [ 362.474900] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 362.479642] ? check_preemption_disabled+0x3c/0x250 [ 362.484645] ? retint_kernel+0x2d/0x2d [ 362.488540] sock_ioctl+0x170/0x470 [ 362.492167] ? sock_ioctl+0x170/0x470 [ 362.495963] ? dlci_ioctl_set+0x40/0x40 [ 362.499923] do_vfs_ioctl+0x7ae/0x1060 [ 362.503810] ? selinux_file_mprotect+0x5d0/0x5d0 [ 362.508570] ? lock_downgrade+0x740/0x740 [ 362.512727] ? ioctl_preallocate+0x1c0/0x1c0 [ 362.517131] ? __fget+0x237/0x370 [ 362.520583] ? security_file_ioctl+0x89/0xb0 [ 362.524993] SyS_ioctl+0x8f/0xc0 [ 362.528343] ? do_vfs_ioctl+0x1060/0x1060 [ 362.532491] do_syscall_64+0x1e8/0x640 [ 362.536378] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.541296] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.546482] RIP: 0033:0x459a59 [ 362.549660] RSP: 002b:00007f664b5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 362.557354] RAX: ffffffffffffffda RBX: 00007f664b5dec90 RCX: 0000000000459a59 [ 362.564655] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 18:51:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 362.571919] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 362.579183] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f664b5df6d4 [ 362.586443] R13: 00000000004cd9d0 R14: 00000000004d7158 R15: 0000000000000009 18:51:46 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) getpid() r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={r3, 0x1f8, "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"}, &(0x7f0000000000)=0x200) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x88000) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r4, 0x800455d1, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={r3, 0x1f, 0x4, [0x5, 0x5, 0x3f, 0x8000]}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='\x00') 18:51:46 executing program 0: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x100) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000080)=""/5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x20) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="278c1213d348"], 0x9) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x0, 0x0, 0xfffffffffffffcff) 18:51:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 362.653214] hfs: part requires an argument [ 362.660793] hfs: unable to parse mount options 18:51:46 executing program 1 (fault-call:13 fault-nth:17): sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 362.725659] device sit0 left promiscuous mode 18:51:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 362.813992] audit: type=1400 audit(1570387906.299:183): avc: denied { sys_admin } for pid=14251 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 18:51:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 362.979113] device sit0 entered promiscuous mode 18:51:46 executing program 4: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000001100)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="0bf736a9b4d2d9a1122fbabe6657c12f84ede6416768da5855fe3b7e1f2a17868da780cb", 0x24}], 0x1}], 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x80000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 18:51:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:46 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x80000000080003, 0x20000000003c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(0x0) socket(0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000001c0)={&(0x7f00000000c0), &(0x7f0000000100)=""/130, 0x82}) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000004c0), 0x14, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) chmod(&(0x7f0000000040)='./bus\x00', 0x8) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000002c0)={0x10000, 0x0, [0x1, 0x1, 0x9, 0xfffffffffffff753, 0x8, 0x2, 0x3, 0xbd]}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r5, 0x200004) sendfile(r2, r5, 0x0, 0x80001d00c0d0) lookup_dcookie(0x0, &(0x7f0000000380)=""/151, 0x97) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_nanosleep(0x3, 0x1, &(0x7f0000000240)={r6, r7+30000000}, &(0x7f0000000280)) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 18:51:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xed, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) r1 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000180)='bridge0\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='&ppp0(cgroup\x00', r1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000001c0)={0x40, 0x3, 0x2}, 0x10) pselect6(0x40, &(0x7f0000000200)={0x101, 0xb6c0, 0x5fa03244, 0x3ff, 0x3, 0x4000000000000000, 0x80000001, 0x3}, &(0x7f0000000240)={0xde, 0x3f, 0xc37, 0x10000, 0x9, 0x4, 0x10001, 0xfffffffffffff346}, &(0x7f0000000280)={0x6d4, 0x200, 0x0, 0x8, 0x0, 0xfff, 0x9, 0xa0000}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x10001}, 0x8}) 18:51:46 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000000)=0x1) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x2710, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r4, 0xc038563b, &(0x7f00000002c0)={0x0, 0x0, {0x0, 0x400, 0x4, 0x397}}) r5 = socket(0x11, 0x80a, 0x0) r6 = open(&(0x7f0000000340)='./file0\x00', 0x80000, 0x100) write$P9_RCREATE(r6, &(0x7f0000000440)={0x18, 0x73, 0x2, {{0xf2c47b1e0c2d18f6, 0x4, 0x5}, 0xffff}}, 0x18) r7 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb], 0x0, 0x80000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x2, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x1, 0xffffffffffffffff]}) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r8, 0x0, 0x0) lseek(r8, 0xfffffffffffffffe, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x4000, 0x0) fstatfs(r8, &(0x7f0000000180)=""/77) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:51:46 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000640), 0x1000) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x1045, 0x0, 0x0, 0x0, 0x77db}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="841f583a09a87ae51c20fe723967f8201f3153a04f8a7c7bc36ab17b9ee248bc5dc6dbbce2e39eb4b46f8f666a7b15602920880a6f774a615bec6cc51c920f57bd09b66fbaa526183b16c2cb24d337ef753d85a4a52fc939bc004c0811d96ff68fcaf9eac43d9494f97700e6c5fb4a30d770a8392bde878ff266b0781e63727d423a6fd114") ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0x110, r1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xfebfffff) write(r2, &(0x7f0000000340), 0x41395527) fanotify_init(0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) 18:51:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 363.234496] bond0: Error: Device is in use and cannot be enslaved 18:51:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:47 executing program 2: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000340)='cpuset.cpu_e:\xac\xec\x9a \xc7\xec<\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x6) 18:51:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xed, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) r1 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000180)='bridge0\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='&ppp0(cgroup\x00', r1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000001c0)={0x40, 0x3, 0x2}, 0x10) pselect6(0x40, &(0x7f0000000200)={0x101, 0xb6c0, 0x5fa03244, 0x3ff, 0x3, 0x4000000000000000, 0x80000001, 0x3}, &(0x7f0000000240)={0xde, 0x3f, 0xc37, 0x10000, 0x9, 0x4, 0x10001, 0xfffffffffffff346}, &(0x7f0000000280)={0x6d4, 0x200, 0x0, 0x8, 0x0, 0xfff, 0x9, 0xa0000}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={0x10001}, 0x8}) [ 363.484914] device bridge_slave_1 left promiscuous mode [ 363.490784] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.561393] device bridge_slave_0 left promiscuous mode [ 363.566961] bridge0: port 1(bridge_slave_0) entered disabled state 18:51:47 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000005c0)='./file1/file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="756c6f77656568f57d9dabbe530f6f1171c1d572646972b18db84b07a15f128f9feddefc2f66696c65312c77"]) chdir(&(0x7f0000000080)='./file0\x00') lsetxattr$security_evm(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="4655bfa9865112895c7533146ac4b92375b01bd8a524063d4b1cf58c19d93189a4f40c0a76ea112951e4fb7f937d4c2fd960a9a10b05ff000000000000007b00000000000000000000000000000077efaba50e22717da923ff580f9c209f40f9f3165c8e9d78c56bdcdafc2c4675b9dcd29595ab345d831515611bc65470890acf1646451ca07882f53cb5231b0dc6b2320d86f2b511a1f643bc1ea7136d7a1f25"], 0xf, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000180)='./file0\x00') r2 = socket$inet6(0xa, 0x3, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000004a80)={0x0, 0x0, 0x0}, &(0x7f0000004ac0)=0xc) keyctl$chown(0x4, 0x0, r3, r4) fchownat(r1, &(0x7f0000000200)='./file1/file0\x00', 0xee00, r4, 0x400) [ 363.669814] overlayfs: unrecognized mount option "uloweehõ}«¾SoqÁÕrdir±¸K¡_ŸíÞü/file1" or missing value 18:51:47 executing program 3: ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2d, @default, @netrom={'nr', 0x0}, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) mount$9p_tcp(&(0x7f00000002c0)='127.0.0.1\x00', &(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=tcp,', {'port', 0x3d, 0x4e22}}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x803, 0x1) splice(r2, 0x0, r3, 0x0, 0x8001, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x5, 0x0, 0xcecc, 0x40, 0x80000001, 0x7fffffff, 0x5, {r5, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x9, 0x3f, 0xf53}}, &(0x7f0000000500)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000080)={r5, 0x8e, 0xfff}, 0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={r5, 0xacc9, 0x20, 0x3, 0x7}, &(0x7f00000000c0)=0x18) [ 363.792549] bond4 (unregistering): Released all slaves [ 363.828129] bond3 (unregistering): Released all slaves [ 363.853377] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 363.898505] bond2 (unregistering): Released all slaves [ 363.946930] bond1 (unregistering): Released all slaves [ 364.034684] device hsr_slave_1 left promiscuous mode [ 364.094475] device hsr_slave_0 left promiscuous mode [ 364.154228] team0 (unregistering): Port device team_slave_1 removed [ 364.193823] team0 (unregistering): Port device team_slave_0 removed [ 364.229993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 364.297711] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 364.451103] bond0 (unregistering): Released all slaves [ 364.543900] overlayfs: unrecognized mount option "uloweehõ}«¾SoqÁÕrdir±¸K¡_ŸíÞü/file1" or missing value [ 364.628343] 9pnet: p9_fd_create_tcp (14327): problem connecting socket to 127.0.0.1 [ 366.761457] IPVS: ftp: loaded support on port[0] = 21 [ 367.621201] chnl_net:caif_netlink_parms(): no params data found [ 367.665884] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.672539] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.679695] device bridge_slave_0 entered promiscuous mode [ 367.686770] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.693332] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.700903] device bridge_slave_1 entered promiscuous mode [ 367.724532] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 367.734176] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 367.755438] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 367.763032] team0: Port device team_slave_0 added [ 367.768769] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 367.776220] team0: Port device team_slave_1 added [ 367.781744] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 367.789179] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 367.843532] device hsr_slave_0 entered promiscuous mode [ 367.880564] device hsr_slave_1 entered promiscuous mode [ 367.920776] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 367.927942] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 367.943214] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.949579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.956251] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.962654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.997620] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 368.004413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 368.014248] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 368.024140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.034621] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.042030] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.052009] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 368.058087] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.068273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.076190] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.082653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.095895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.103680] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.110215] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.130835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 368.147978] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 368.158310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 368.169831] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 368.176587] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 368.184404] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 368.192267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.199781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.207748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 368.220807] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 368.231859] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 368.600686] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 369.528043] device nr0 entered promiscuous mode [ 369.716000] device nr0 entered promiscuous mode 18:51:53 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) bind$bt_l2cap(r1, &(0x7f0000000180)={0x1f, 0x4, {0x20, 0x80, 0xfd, 0x3, 0x1, 0x1}, 0x1, 0x5}, 0x374) memfd_create(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2000000000fe, 0xffffffffffffffff, 0xc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getrlimit(0x5, &(0x7f0000000300)) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x80, 0x0) fchmod(r0, 0x102) sync() ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000240)=0x4) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) fchmodat(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000002c0)=""/59) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 18:51:53 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x8) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000140)={0x6, 0xc8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000003c0)={0x9f0000, 0x4, 0xc5, [], &(0x7f00000001c0)={0x990a77, 0x0, [], @p_u16=&(0x7f0000000180)=0x400}}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="9c000000d92500000043e8ba561277994131731c9e235c03b591e1433c00ff3d825edb973735f633aea11677c0f4c81efdee2ce732b908bcfa00e41048c40b242179ea4631225ecf54c58e188bb8fb5b7d2d5f2a7278a0627985f383e1043f92b81e99d71f95d5c99029204e13a93f2390930f12d1ba77f38c0f25a090c0446a66d5758099dd0267266ee87f8f1bfef428f60f3c0e4971bbebd7f43c9f1f0c88ea613f1a269ab0b43dc6c87faf9c0afe67cb64255431ade423f9aa00027df79e922f12a7943486fe363204791e"], 0x3) 18:51:53 executing program 4: ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x10c80, 0x0) ioctl$NBD_DO_IT(r1, 0xab03) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x4000) read$FUSE(r2, &(0x7f0000000580), 0x1000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000400)={0x9, 0x9, 0x1000, 0x12000000, 0x9}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$USBDEVFS_GETDRIVER(r3, 0x41045508, &(0x7f0000000240)={0xfffff202, "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"}) 18:51:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000001300)=ANY=[@ANYBLOB="6fd4039610ccbfbf57fb0b1e0402b779d9ef6902133d5753954166964de26b0a08a0393bc4a9690a44c6f7617ccf302e96b51f55a32e929ae9bf0a2756bc084878f60feb758734e13903411578164a264171f07d1538473c1925c6781cbb143fdb1c6c640b9b1e9ecfd970080f637c695a9d41ee37dbc76c4f738054513da9fd60d3a01907c007403b0e7f7c2f9fe71359db18f1de2b4cfe9c68d25ac42d7a66548a4358f839e5937e6695688c51869f5a62e80ce93dd94be855a78804c7bd2e26433cbba7e63a52128dbe89019cc398e078dcfa58ad", @ANYRESDEC=r3, @ANYRESHEX=r4, @ANYRES32=r5, @ANYRESOCT, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="14d83744db957bb5f0be80f8bdaf5d17c48c7d65aff57ebd27ad4bdef45204296362ac5752dbe9c0841e649ae2464ed4ab699cd7c84dae1fed96f326990581af0c527d56875114c9acde58926e666507f4bb4dc5709e3f31018a9358744ea02bc06b0081596e4fe1546aad4a71d3eb76b23571e6bce607428064738f36f36c0f2ff4c8b1acabe1374af44e93ff95e92a86a51193d9cea72bdb58b2d526c8f45fad69b9336c34d5d872146dcdb4720edac1c3d5db73cc70e692d9ba7e871ddc9ae61f7a251e3b45d11c94d04334fec6207dc867", @ANYRESDEC=r6, @ANYRESOCT=0x0, @ANYRESHEX, @ANYRES16=r7, @ANYPTR64, @ANYPTR, @ANYRES16=0x0], @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYBLOB="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"]], @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c00020008000400ffffffff"], 0x3}}, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000000)={0xff, {0x275, 0x5, 0x1f9301dc, 0x5, 0x1f, 0x8001}}) 18:51:53 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001900000000000000000000000007d3050001ff88d2000000"], 0x1c}}, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x61883bea5100b932, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xcc08}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) unshare(0x40040400) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x8, 0xa5c, 0x0, 0x0, 0x0, 0x1f6, 0xfff, 0x1, 0x0, 0x0, 0x5, 0x2, 0x0, 0x5, 0x0, 0x0, 0x400, 0x0, 0x2, 0x0, 0x9, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x9}, 0x280, 0x5e, 0xeb67, 0x7, 0x0, 0x5, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x200e80, 0x14) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = fanotify_init(0x0, 0x0) fanotify_mark(r4, 0x0, 0x0, r3, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000240)) close(0xffffffffffffffff) r5 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$RXRPC_SECURITY_KEY(r5, 0x110, 0x1, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x16) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000380)) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x1000, 0xfffffffd, 0x0, 0x18, 0x0, 0x65}}) seccomp(0x1, 0x0, &(0x7f00000004c0)={0x4, &(0x7f0000000400)=[{0x9, 0x6, 0x80, 0x8}, {0x5, 0xc5, 0x3}, {0xef, 0x0, 0x0, 0x6}, {0x80, 0x9, 0x4, 0x4}]}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="73797a30ed5adcd4fb1d0d0320c65eb89e4105023189f36ead60526b0344"], 0x1e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 18:51:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xff7ffffffffffff7) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="64654275672c30b8d21f3d30c6fa5b13f81c6245f660e899656f72746e616d"]) [ 369.983438] IPVS: ftp: loaded support on port[0] = 21 18:51:53 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3f) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$cont(0x9, r3, 0x0, 0x28) sendmsg$nl_route(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@RTM_NEWNSID={0x2c, 0x58, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NETNSA_FD={0x8}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_PID={0x8, 0x2, r3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8c1f2c421fa2cea1}, 0x20008180) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='vmnet0wlan0mime_type\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 370.027446] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.034142] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.062552] FAT-fs (loop3): Unrecognized mount option "deBug" or missing value 18:51:53 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000040)='/de\x01\x00', 0x0, 0xa89b2a0a2a822333) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0x6) 18:51:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r3) r4 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="68dc4dec7bd58967c6bedd46028044b657253ccb693e0e791545bac3194b33467fc8bd848c9eb526d0b50ef79f127a19cf4a27749d8a6597c32098bbe77042988f37c7768db315a7a137dd2892e29ffe1ac045700fd556aa2b97ab65bc3502e588688e1afc9bcf531b9b6cd76ccb07b7b5ef315beac3a78b072aaaacf0056b3007975f70216a8da61ec0a89634110e5109f4513ebdd7bebd0338f059d2bc9815b6757652b29bad19ab39fd3740a2ca6b6576e3097e7fb9980b3eeaf66c1d77855a0994926648d1ac", 0xc8, r3) keyctl$assume_authority(0x10, r4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 18:51:53 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$vfat(&(0x7f0000000780)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff578, 0x0, &(0x7f0000000740), 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) sendfile(r1, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000200)=""/124) r2 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r2, &(0x7f0000000700)=ANY=[@ANYBLOB="bcef637668e579f1a2da68983a9015f704c4f0040000"], 0xc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x4000, 0x0) ioctl$KVM_SET_CLOCK(r3, 0x4030ae7b, &(0x7f0000000140)={0x3, 0x7e32}) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) socket$rxrpc(0x21, 0x2, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) syz_mount_image$nfs(&(0x7f0000000340)='nfs\x00', &(0x7f0000000380)='./bus\x00', 0x80000001, 0x4, &(0x7f0000000500)=[{&(0x7f00000003c0)="d25aa56ef83692375bc8381ee3a1541e7f64cdf44cbc7c", 0x17, 0xfffffffffffffc01}, {&(0x7f0000000400)="1553db1f617cc02d411f578cc96838697c30f39d3a36f4e0fae1400a127fd287afc1f3759217d05f2dfaecdbbf7ec1b1fc08dcf00a17d2680d63ca43e31ff29fc60300000031f28b1025cb31744700684530b52da8c832d8c49ab0f8beb3588d7a5dcd1d64c87f5eb0ef5d170867b1ab161b3d58b5", 0x75, 0x8}, {&(0x7f0000000480)="51bd12b399af83066c64ab9e5a4caf03c25866b81b36f8d8b8ca50b51d859d234c1004743664c35d0c48ccd127fa40230749b95b084208fddf5ccd4618d5892368720bf43550e919afd42dfd89895952532aab39c380f46f5f1432f28acb313626f2038dd40134e700", 0x69, 0x7fffffff}, {&(0x7f00000005c0)="845f6cfdffff9706513aa345b87a1e040df6d818882d73a99c0f256b4cedd1729811769809cacd63f6de783de52f3e59289953c6bb3bd838d3a1c1f10403c614297fdb97e068f80c2082b716f622fc5b49aa7b1d0f1c470139055c41427cb6408b7052988c3d269820d6c36f8a1cef6036adefd6e5c39c4c813aae174b7c813479063f56b0c0779830e57a14c6ad20a334b6aac075bda3c38790b0ca811e5ac2dc6f9c0f7f5dfad8ea3ee3c50ff05666987e7f057d9938d17152ac88635840ca25f16d02d016dbf6954ee1cd47b3f89ab2de17653de0c6a593bc68812c6e9548c911b2ad", 0xe4, 0x7f}], 0x10400, &(0x7f00000006c0)='\x00') pipe(&(0x7f0000000280)={0xffffffffffffffff}) r5 = socket$inet(0x2, 0x803, 0x1) splice(r4, 0x0, r5, 0x0, 0x8001, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r7, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x5, 0x0, 0xcecc, 0x40, 0x80000001, 0x7fffffff, 0x5, {r7, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x9, 0x3f, 0xf53}}, &(0x7f0000000500)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000080)={r7, 0x8e, 0xfff}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000740)={r7, 0x9}, &(0x7f00000007c0)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000880)={r8, 0xc44c}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) renameat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 18:51:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) connect$ax25(0xffffffffffffffff, &(0x7f0000000240)={{0x3, @bcast, 0x4}, [@bcast, @bcast, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x48) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531b4bfbc4f58a17949c425a1dc514249758a3ec46a23661d160d02ac3fa2dd2b7de96ac75359024110a99d5d31b88cbb02680a95267a20aa70d6b848e013a7aff9ffb8a64677a47a5fad9ae38a86624492e5c5fd386fca6a434e18610585687484e7b720b106fb1515a280750feac0ff2fc8fe90d9e1463bbb6ab177eb45b0d9f6dfe2d3f69068aef725a28f5571c05e"]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000008bc0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x8001, @remote, 0x7}}}, 0x30) chdir(&(0x7f0000000180)='./file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f00000003c0)=""/115, 0x73}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000000b00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000002d80)=[{0x0}, {&(0x7f0000000c40)=""/26, 0x1a}], 0x2, &(0x7f0000002e00)=""/178, 0xb2}}, {{&(0x7f0000002ec0)=@xdp, 0x80, &(0x7f00000043c0)=[{0x0}, {&(0x7f0000003040)=""/30, 0x1e}, {&(0x7f0000003080)=""/179, 0xb3}, {0x0}, {0x0}], 0x5, &(0x7f0000004440)=""/2, 0x2}}, {{&(0x7f0000004480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006800)=[{0x0}, {&(0x7f0000005740)=""/192, 0xc0}, {0x0}], 0x3}, 0x2}, {{0x0, 0x0, &(0x7f0000006dc0)=[{&(0x7f00000069c0)=""/160, 0xa0}, {&(0x7f0000006ac0)=""/73, 0x49}, {0x0}, {0x0}, {0x0}], 0x5}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000007580)=""/248, 0xf8}, 0x4}], 0x7, 0x1, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:51:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040), 0x4) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/member\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) syz_emit_ethernet(0x12, &(0x7f0000000000)=ANY=[@ANYBLOB="01000088a800"/18], 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000440)) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$vbi(&(0x7f00000004c0)='/dev/vbi#\x00', 0x2, 0x2) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) execveat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=[&(0x7f00000000c0)='\x00', &(0x7f0000000100)='^securitywlan0ppp0{vmnet1eth0em1(vmnet0&\x8b&^+)cgroup\xe6}eth0em0\x00', &(0x7f0000000140)='#\x00', &(0x7f0000000180)='vboxnet1eth0*-,systemselinuxtrustedppp1ppp0em1\x00', &(0x7f00000001c0)='security#@ppp0:\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='eth0{\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='cgroup+-lo\x00'], &(0x7f0000000400)=[&(0x7f0000000380)='#%*\'mime_type/(%:\x00', &(0x7f00000003c0)='/eth0\\\x00'], 0x1000) 18:51:53 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 370.433051] IPVS: ftp: loaded support on port[0] = 21 [ 370.528598] overlayfs: failed to resolve './file1´¿¼OX¡yIÄ%¡ÜQBIuŠ>Äj#f ¬?¢Ý+}éjÇSYA©]1¸Œ»h [ 370.528598] •&z ªpÖ¸H৯ùÿ¸¦Fw¤z_­šãŠ†bD’åÅý8oÊjCNa…ht„ç· ±û¢€uêÀÿ/ÈþÙáF;»j±wëE°ÙößâÓöh®÷%¢UqÀ^': -2 18:51:54 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001480)={0xffffffffffffffff, 0x0, 0x6f, 0x0, &(0x7f00000014c0)="a6457f096b708820a2884613c8c35c6a826a24af2a683e939f38a13ffcf42fd3b85fbec49e93f3aaff95978dd1b97753269620cb593fdc7711a6cc940d10b4a3f7ebb73ba20bab29ed07edbc031a4b9b1dc979f0721ae0ed1d7bce7b31af2c7032354bca1acb95fe9070c78a931855", 0x0}, 0x28) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="cefaad1bb83c000040dc", 0xa}], 0x802, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0xfa87d0876e2f0c2d) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = socket(0x10, 0x4, 0x8) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) sendmsg$unix(r0, &(0x7f0000000280)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000180)="e4ec50a76d0746e0976d7ea2cdd0e9d0ff0ad0184438ccccfbf3bb173a776974", 0x20}], 0x1, &(0x7f0000000200)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r3, r5]}}, @rights={{0x18, 0x1, 0x1, [r6, r7]}}], 0x80}, 0x9ecbadf74bc5aba7) 18:51:54 executing program 3: ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc050561a, 0x0) pipe(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x8000000000000010, 0x0, 0x2000005) fallocate(r0, 0x0, 0x0, 0x10ffff) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000100)={0xbe, 0xfa, 0x0, 0x1000, 0x13, 0x4, 0xe1, 0x2c, 0x46a}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) getsockopt$inet6_mreq(r1, 0x29, 0x14, 0x0, 0x0) r2 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x800) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f00000000c0)) 18:51:54 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:51:56 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x6, 0x5, 0x96, &(0x7f0000000100)="5ff5d5307cf455813e46cc60d74736d2f83e519eb209a9d1ff1efe617d8de2096728fe0e165c1bebfab2858e28bbf5f00aeaba61747597682b68751cc767219ebeb608f0f9053867c51b7d6a036eb12ab0acd0b8ec8ba83c2410d2241cace13087894ea89230982bd85b07943dbb54f997ef211aaf929d8dca853cb3872471ae0918963b0c9f972a52534967459a0b9d6d12848782dd"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000040)=0x4, 0x4) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 18:51:56 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000000100)={0x1, 0x0, [{0x80000001, 0x0, 0x0, 0x1ba02f2b}]}) 18:51:56 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0xffffffffffffdbfe, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) r6 = inotify_init() lseek(r6, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={r2, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000640)='\xc3\x00', 0xffffffffffffffff}, 0x30) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r8, 0x0, 0x0) lseek(r8, 0xfffffffffffffffe, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f00000008c0)=0x13b) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fstat(r10, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r11) r12 = openat$zero(0xffffffffffffff9c, &(0x7f0000000900)='/dev/zero\x00', 0x0, 0x0) r13 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000940)='syz1\x00', 0x200002, 0x0) r14 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r14, 0x0, 0x0) lseek(r14, 0xfffffffffffffffe, 0x1) r15 = openat$cgroup_procs(r1, &(0x7f0000000980)='tasks\x00', 0x2, 0x0) r16 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r16, 0x0, 0x0) lseek(r16, 0xfffffffffffffffe, 0x1) r17 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r17, 0x0, 0x0) lseek(r17, 0xfffffffffffffffe, 0x1) r18 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r18, 0x0, 0x0) lseek(r18, 0xfffffffffffffffe, 0x1) r19 = timerfd_create(0x1007efcfc7f88278, 0x1400) r20 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r20, 0x0, 0x0) lseek(r20, 0xfffffffffffffffe, 0x1) r21 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r21, 0x0, 0x0) lseek(r21, 0xfffffffffffffffe, 0x1) sendmsg$unix(r5, &(0x7f0000000a80)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000300)="f5a10cfb58b28b6302277f3ecbe3b7069b49656fa56672a974041d6c472b6f4223b5fce8759d36867b3603681f297ab49c23445af3326c07cfac97a79236c870818373419114d7d44d4564e0e3f59f10433bbef9b110957dccf20dcdafbdb135e894b297a1811adcb22946650271e26f36491cfde1e14afc22cf4526e978f6d3ad399f6d9e33936eac664f5384fddc315f1993013b0f4cc185d594b073480f11096782de693bbf96e230bd5628110527cb09aa9573fefd895d35f5e8683d52aa5c479cdbbbaeba4536a99d", 0xcb}, {&(0x7f0000000400)="42ab6b662427923755eedcf19fd5a497041026b794c1a54a2dc7fcd95f353445f4f5cabe36e43db85a58366780b42bfcbfcdc7c9c98bf906b994516b83d4a97c3518deddacb579a3ccecce82ed199b8bc722794f0ff3375b69868e6bcb60c226831934748c2c09e69318359f1d6de17cd573a548e2719344d982cde0e47230c1acea4dd58c7de0ae9910cb98af9bbc6f8467a22c1d6d299c286d7a03b3531321", 0xa0}, {&(0x7f0000000180)="1415d39feff7a3003815b740300313819410ce0210edf663be5dc7454276fb550b383ce4c17d1754c2ba5fedce9554db37927af43456ca29591f8238ff5962bb031f288d4daf46667e1d8b971b8f67b076e2029301fe829dbe5fcd3897399c5c4f494ae270e730e207de4c", 0x6b}, {&(0x7f00000004c0)="c0a300cc8e51840cfa54d82e6c345631aee322322124f928a3166107c46c2c7ae7b0afeea21f276bc0469c6fd15258bf5df1e4811b4d2c2d47096ad921a3c51e", 0x40}, {&(0x7f0000000500)="8af1274621a3a202c22ffdbc4258acb16d8676b5c904950cc6c928190f6c0ed091f082a8ad5cfe21192de0cc05f41a044ac35b36bde1322543a7b9708ca18c5ad0e4306b129b384ad67a7f74751fb0089cc3d49b459c71976ffa7f83638ba368fd8a70d57572d904a035e0bae49f36c6ee04016e", 0x74}, {&(0x7f0000000580)="fa65effd0db3f77ec94cc951bb95cb5db9a39d548dded98f9a31438a8ab222bd3626ce40e93542f66e9bc1a9a82a626face41ffd7a8ac6b0cc73c4e3ddfe2151e2e448452f6be7d5fcbce87e76de9397325a6249ef7e9fda3702089e9e4591cfe989a1b543673a1666009b5ce4900ad3d4b730d6715445f15b4562a01db0c8f53b85d80ea4031ba58ec03cc9087263f0a730b8c1e57089e5e09c1c297d35fd9542d767", 0xa3}], 0x6, &(0x7f00000009c0)=[@cred={{0x1c, 0x1, 0x2, {r7, r9, r11}}}, @rights={{0x24, 0x1, 0x1, [r12, r13, r14, r15, r16]}}, @rights={{0x18, 0x1, 0x1, [r17, r4]}}, @rights={{0x28, 0x1, 0x1, [r3, r0, r1, r18, r19, r20]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r21]}}], 0xa0, 0x80}, 0x40004) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000180)=""/98) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000200)={0x0, 0x101}) lseek(r1, 0xfffffffffffffffe, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000140)) [ 372.983320] EXT4-fs warning (device loop3): ext4_fill_super:3600: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 373.015943] EXT4-fs (loop3): VFS: Found ext4 filesystem with unknown checksum algorithm. 18:51:56 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/201) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x80000000, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x448800, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000001c0)={0x401, 0x0, 0x4, 0x0, {}, {0x3, 0x2, 0x5, 0x1, 0x53, 0x1f, "467df7c9"}, 0x5, 0x4, @offset=0xc8, 0x4}) r2 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000280)={0x1, 0x0, @pic={0x4, 0x0, 0x8, 0x2, 0x8, 0x9, 0x40, 0x2, 0x9, 0x8, 0x6, 0x7, 0x7, 0x0, 0xfa}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3f5596232148dc6d, 0x6, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x44fc2733}, [@map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x3b}]}, &(0x7f00000003c0)='syzkaller\x00', 0x5, 0xae, &(0x7f0000000400)=""/174, 0xef183f403b8cc27d, 0xf, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0x8, 0x1, 0x7fffffff}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000005c0)=r3, 0x4) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000600)) r4 = syz_open_dev$mice(&(0x7f0000000680)='/dev/input/mice\x00', 0x0, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) r5 = syz_open_dev$audion(&(0x7f0000000700)='/dev/audio#\x00', 0x10000, 0x202882) ioctl$VIDIOC_PREPARE_BUF(r5, 0xc058565d, &(0x7f0000000740)={0x891a, 0x0, 0x4, 0x50cdd407b017fda8, {0x77359400}, {0x4, 0x0, 0x2, 0xfb, 0x7, 0xf8, "517d8719"}, 0x0, 0x0, @userptr=0x513, 0x4}) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000001f00)=@sack_info={0x0, 0xfffff801, 0xffffffff}, &(0x7f0000001f40)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000001f80)={r7, 0x0, 0x100}, &(0x7f0000001fc0)=0x8) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000002040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r8, &(0x7f0000002100)={&(0x7f0000002000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000020c0)={&(0x7f0000002080)={0x1c, r9, 0x100, 0x70bd28, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40001) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000002140)='/selinux/relabel\x00', 0x2, 0x0) r10 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000002240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r10, 0x84, 0x70, &(0x7f0000002280)={r7, @in6={{0xa, 0x4e22, 0x3, @ipv4={[], [], @broadcast}, 0x7}}, [0x6, 0x8, 0x8001, 0xe9c, 0x7, 0x6, 0x8, 0x8, 0x7fff, 0x5, 0xdb, 0x2, 0x0, 0x100000000, 0x4]}, &(0x7f0000002380)=0x100) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000023c0)='/proc/capi/capi20\x00', 0x2d8740, 0x0) r11 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000002400)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$UI_END_FF_UPLOAD(r11, 0x406855c9, &(0x7f0000002440)={0xb, 0x7, {0x51, 0x7, 0xffff, {0x3, 0xffff}, {0x82, 0xfff}, @ramp={0xff00, 0x4, {0x8001, 0x7, 0x800, 0x20}}}, {0x52, 0x1ff, 0x3ff, {0x8, 0x9}, {0x1, 0x1000}, @const={0x0, {0x7fff, 0x300, 0xfffd, 0x9ad9}}}}) eventfd(0xffff) r12 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000024c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r12, &(0x7f0000002500)='trusted.overlay.opaque\x00', &(0x7f0000002540)='y\x00', 0x2, 0x5) fcntl$getflags(r2, 0x408) 18:51:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x2, 0x3, 0xff) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x28, 0x0, &(0x7f0000000100)=[@request_death={0x400c630e, 0x2}, @dead_binder_done, @dead_binder_done], 0x7a, 0x0, &(0x7f0000000140)="c9d8a5e670bfabe0f95dbe1aa84518acc3690a197ded5f30e01945c6de43662f83e97917e270519e7f178de1d06dcdac823221877334ea02b5c309a2e4fb44af16d46a255fb2acc5c067bbaca0e5a436ec73e25159918db865f2fdd71e0b0444e2851ce5a193ebb29bf9d0c5bcdddaec73c35d4513991b836ed2"}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r3, 0xc0045520, &(0x7f00000000c0)=0x80000001) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000)=0x10000, 0x8) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="4ef27f454c4600000433006c00000000000000005e1005e00000000000380b00e00000000009000400"/55], 0x38) 18:51:56 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 373.313726] QAT: Invalid ioctl [ 373.339066] QAT: Invalid ioctl 18:51:56 executing program 2: syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaac8aaffffffffffff080045000030000000000001907814bbac1414"], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp\x00') preadv(r0, &(0x7f0000001300), 0x0, 0x10000000) syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000001300), 0x0, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}}}, &(0x7f0000000380)=0xe8) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000003c0)={r4, 0x1, 0x6, @broadcast}, 0x10) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r5, &(0x7f0000000180)='.//ile0\x00', r5, &(0x7f00000007c0)='./file0/f.le.\x00') [ 373.410829] QAT: Invalid ioctl [ 373.465976] QAT: Invalid ioctl [ 373.675556] overlayfs: filesystem on './file0' not supported as upperdir [ 373.731719] IPVS: ftp: loaded support on port[0] = 21 [ 374.607124] chnl_net:caif_netlink_parms(): no params data found [ 374.655780] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.663034] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.670284] device bridge_slave_0 entered promiscuous mode [ 374.677505] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.684288] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.691667] device bridge_slave_1 entered promiscuous mode [ 374.716007] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 374.725548] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 374.749754] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 374.758926] team0: Port device team_slave_0 added [ 374.766943] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 374.777773] team0: Port device team_slave_1 added [ 374.783329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 374.791955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 374.853350] device hsr_slave_0 entered promiscuous mode [ 374.890533] device hsr_slave_1 entered promiscuous mode [ 374.940583] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 374.947590] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 374.970446] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.976820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.983493] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.989837] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.036275] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 375.042971] 8021q: adding VLAN 0 to HW filter on device bond0 [ 375.057364] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 375.066371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 375.074198] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.081685] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.097679] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 375.103901] 8021q: adding VLAN 0 to HW filter on device team0 [ 375.114052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 375.121824] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.128347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.140444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 375.148060] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.154471] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.177754] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 375.188675] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 375.199569] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 375.206909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 375.215619] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 375.223526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 375.231782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 375.239410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 375.246465] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 375.267791] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 375.279909] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 375.610799] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 375.880638] device bridge_slave_1 left promiscuous mode [ 375.886121] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.943911] device bridge_slave_0 left promiscuous mode [ 375.950050] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.965674] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing 18:51:59 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x875e5a8543f90536, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="006386dd03"], 0x90ad) 18:51:59 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000aa000000ffffffff000000000400006c3352e04eaa623609890000000000"]) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000100)=0x401) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:51:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x80000, 0x16) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x4, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$sock_ifreq(r3, 0x0, 0x0) rmdir(0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000380), 0x0) socket(0xa, 0x0, 0x0) r5 = socket(0x100000001b, 0x400000400080803, 0x0) r6 = dup(r5) write$cgroup_int(r6, 0x0, 0x0) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xfffffddf) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r8}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000440)) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r9, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 18:51:59 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, 0x0, &(0x7f0000000340)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r5}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x1, &(0x7f0000c91000)=ANY=[@ANYBLOB="85000000000000a500001d000000009500000000000000"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x12c, &(0x7f000000d000)=""/153, 0x0, 0x0, [], r5}, 0x3e) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x2, 0x0) ioctl$BINDER_SET_MAX_THREADS(r6, 0x40046205, &(0x7f0000000300)=0xfff) gettid() r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) ioctl$DRM_IOCTL_GET_CAP(r7, 0xc010640c, &(0x7f00000000c0)={0x7, 0x100}) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x140000, 0x0) ioctl$FS_IOC_SETVERSION(r8, 0x40087602, &(0x7f0000000240)=0x6) r9 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r9, 0x0, 0x0) lseek(r9, 0xfffffffffffffffe, 0x1) write$UHID_CREATE(r9, &(0x7f0000000380)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000100)=""/156, 0x9c, 0x800, 0x9, 0xdffe, 0x6, 0x8}, 0x120) 18:51:59 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_genetlink_get_family_id$tipc(0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x3, &(0x7f0000000000), 0x0) 18:51:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 375.985853] audit: type=1400 audit(1570387919.479:184): avc: denied { create } for pid=14493 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 18:51:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x220, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x7882, 0x6, 0x1, 0x2, 0x12a}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') sendfile(r0, r1, 0x0, 0xb2c) [ 376.213924] device hsr_slave_1 left promiscuous mode [ 376.255914] device hsr_slave_0 left promiscuous mode [ 376.314910] team0 (unregistering): Port device team_slave_1 removed [ 376.329531] team0 (unregistering): Port device team_slave_0 removed [ 376.341476] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 376.386849] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 376.486473] bond0 (unregistering): Released all slaves 18:52:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket(0x10, 0x2, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) open(0x0, 0x0, 0x4) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='uppErdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000001c0)='./file0/f.le.\x00', 0x8) recvmmsg(r1, &(0x7f0000006080), 0x3ea818461ad51e9, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sync() [ 376.593320] audit: type=1400 audit(1570387920.089:185): avc: denied { map } for pid=14536 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:52:00 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40080) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x2e7}, 0x40) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000180)) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0xa0c, 0x4}, {0x5, 0x1}, {0x7, 0x3}]}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:00 executing program 0: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x70bd27, 0x0, {0x0, 0x0, 0x0, 0x0, 0x46000, 0x4010}, [@IFLA_LINKINFO={0x18, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x8, 0x2, [@tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x103}]]]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000080)={{0x87, @multicast2, 0x4e24, 0x2, 'fo\x00', 0xb4d4f1e3e901edc0, 0x4, 0x5b}, {@rand_addr=0x3, 0x4e22, 0x1, 0x4, 0x7, 0x4}}, 0x44) [ 376.735284] overlayfs: unrecognized mount option "uppErdir=./file0" or missing value [ 376.787865] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 18:52:00 executing program 0: getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0x1, 0x2) r0 = open(&(0x7f0000000300)='./file0\x00', 0x86842, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = open(&(0x7f0000000300)='./file0\x00', 0x86842, 0x0) write$9p(r2, 0x0, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fallocate(r2, 0x40, 0xfffffffffffffffc, 0x1) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r4, 0x1c, 0x1, @in6={0xa, 0x4e20, 0x6, @empty}}}, 0xa0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000) 18:52:00 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f00000002c0)={0x6, 0x0, 0x4, 0x400, {0x77359400}, {0x4, 0x0, 0x7b, 0xa5, 0x2, 0xbe, "99e8f487"}, 0x3, 0x6, @planes=&(0x7f00000000c0)={0x401, 0xff, @userptr=0x10000, 0x3f}, 0x4}) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:52:00 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440), 0x9d, 0x0, 0xffffffffffffff59}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x2, 0x8, &(0x7f0000000100)) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:00 executing program 2: syz_emit_ethernet(0x6e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd6008de0600383a0000000000000000000000ffffe0000001ff0200000000000000000000000000010200907800000000609433df00002c00fe88000000090000000000000000000100000000000000000000000000000001fca967e17f791010"], 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)={0x6, 0x0, 0x40}) [ 376.998690] audit: type=1800 audit(1570387920.489:186): pid=14559 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16564 res=0 18:52:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48}}]}, 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=@newtfilter={0x48, 0x2c, 0x701, 0x0, 0x0, {0x0, r4, {}, {}, {0x3}}, [@filter_kind_options=@f_rsvp6={{0xc, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @ipv4}]}}]}, 0x48}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 377.159702] audit: type=1804 audit(1570387920.489:187): pid=14559 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir116030821/syzkaller.MuLsOe/3/file0" dev="sda1" ino=16564 res=1 [ 377.352292] audit: type=1400 audit(1570387920.549:188): avc: denied { create } for pid=14558 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 377.388747] audit: type=1804 audit(1570387920.589:189): pid=14566 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir116030821/syzkaller.MuLsOe/3/file0" dev="sda1" ino=16564 res=1 18:52:01 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440), 0x9d, 0x0, 0xffffffffffffff59}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x2, 0x8, &(0x7f0000000100)) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:01 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_WIE_OFF(r0, 0x7010) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$TIOCSSERIAL(r3, 0x541f, &(0x7f0000000180)={0x6, 0x4, 0x8, 0x7, 0x97, 0x200, 0x1, 0xfffff0aa, 0x3abf, 0x4, 0x9, 0xffffff27, 0x80, 0x6, &(0x7f0000000100)=""/95, 0x6, 0x98a, 0x1}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 377.516528] overlayfs: unrecognized mount option "uppErdir=./file0" or missing value [ 377.558379] audit: type=1804 audit(1570387921.049:190): pid=14566 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir116030821/syzkaller.MuLsOe/3/file0" dev="sda1" ino=16564 res=1 [ 377.666174] Unknown ioctl 28688 [ 377.761466] audit: type=1804 audit(1570387921.099:191): pid=14559 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir116030821/syzkaller.MuLsOe/3/file0" dev="sda1" ino=16564 res=1 [ 377.875540] Unknown ioctl 28688 18:52:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0xe, 0x4) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 18:52:02 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) chdir(&(0x7f0000000100)='./file0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:02 executing program 0: syz_genetlink_get_family_id$fou(0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x80000000007f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x81}, 0x0, 0x4, r2, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f00000004c0)=@md5={0x1, "55a4209f8e346e522f7af1d5d2bcd298"}, 0x11, 0x0) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0xfe) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000100)={0x0, 0x0, 0x0, [], 0x0}) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', '$\x00'}, &(0x7f0000000240)=""/237, 0xed) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r8, 0x0, 0x0) lseek(r8, 0xfffffffffffffffe, 0x1) r9 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r9, 0x0, 0x0) lseek(r9, 0xfffffffffffffffe, 0x1) socket$nl_crypto(0x10, 0x3, 0x15) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r10, 0x0, 0x0) lseek(r10, 0xfffffffffffffffe, 0x1) r11 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r11, 0x0, 0x0) lseek(r11, 0xfffffffffffffffe, 0x1) sendfile(r11, r10, &(0x7f0000000200), 0x7ff) 18:52:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={'rose', 0x0}, 0x380000, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, 0x0, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}) 18:52:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000000c0)=[0x623, 0x3a]) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x492, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r5, r4, r4}, &(0x7f0000000140)=""/112, 0x70, &(0x7f0000000580)={&(0x7f0000000500)={'sha3-384\x00'}}) [ 379.054394] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 379.067725] audit: type=1400 audit(1570387922.559:192): avc: denied { write } for pid=14597 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 379.080415] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 379.114738] audit: type=1400 audit(1570387922.559:193): avc: denied { read } for pid=14597 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 379.116654] ubi0: attaching mtd0 18:52:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000000)={0x0, 0x6, 0x8, 0x8}) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x0, 0x0, 0x4b564d03], [0xc1]}) 18:52:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) pipe(0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000240)=""/113, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), 0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0xfffffffffffffffc) clock_adjtime(0x6, &(0x7f0000000480)={0x400, 0x1, 0x200, 0x9, 0x4, 0x0, 0x8, 0x24, 0x6, 0x3, 0x5, 0xbb8, 0x80000000, 0x401, 0x1ff, 0x7fff, 0x40, 0x3b, 0x5, 0x1000, 0x3, 0x7ff, 0xff, 0x0, 0x8, 0x7ff}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="757070657202000000000000006c65302c6c6f7765726469723d2e3a66696c65302c776f726b6469723d2e2f66696c6531"]) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000140)='./file0/f.le.\x00') renameat(r3, &(0x7f0000000180)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') [ 379.249478] ubi0 error: ubi_attach_mtd_dev: bad VID header (67108864) or data offsets (67108928) 18:52:02 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8206) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) mremap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x6}) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x7) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) r4 = dup(r3) ioctl$IMDELTIMER(r4, 0x80044941, &(0x7f0000000080)=0x2) [ 379.319173] ubi0: attaching mtd0 [ 379.330761] ubi0 error: ubi_attach_mtd_dev: bad VID header (67108864) or data offsets (67108928) 18:52:02 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000100)={0x2}) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet(0x2, 0x803, 0x1) splice(r1, 0x0, r2, 0x0, 0x8001, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x5, 0x0, 0xcecc, 0x40, 0x80000001, 0x7fffffff, 0x5, {r4, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x9, 0x3f, 0xf53}}, &(0x7f0000000500)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r4, 0x8e, 0xfff}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={r4, 0xf30a}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x101, 0x20d, 0x3ff, 0x80, r5}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r6, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:02 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x8, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r1, &(0x7f0000000040)) 18:52:02 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000040)={0x3f, 0x7, 0x4, 0x2, {0x0, 0x7530}, {0x9, 0x1, 0x0, 0x5, 0x7, 0x5, "8e6bf328"}, 0x0, 0x4, @userptr=0x8a, 0x4}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xa0000, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)={0xb, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x1000, 0x5, 0x101, 0xff, 0x7, 0x20, "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"}, 0x1118) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) fcntl$setpipe(r1, 0x407, 0x1000000) [ 379.616090] overlayfs: unrecognized mount option "upper" or missing value 18:52:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:05 executing program 0: getrandom(&(0x7f00000002c0)=""/28, 0x1c, 0x3) r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000480)={0x10, 0xbbf4}, 0xfffffffffffffdc7, &(0x7f0000000040)={&(0x7f0000000b00)={0x1c, 0x11, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @str='access'}]}, 0x1c}}, 0x0) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r4, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") readv(r1, &(0x7f0000000940)=[{&(0x7f0000000500)=""/240, 0xf0}, {&(0x7f0000000600)=""/82, 0x52}, {&(0x7f0000000680)=""/116, 0x74}, {&(0x7f0000000700)=""/140, 0x8c}, {&(0x7f00000007c0)=""/152, 0x98}, {0xfffffffffffffffd}, {&(0x7f0000000880)=""/183, 0xb7}], 0x7) r5 = socket$inet_udplite(0x2, 0x2, 0x88) bind(r2, &(0x7f0000000340)=@ax25, 0x80) sendto$inet(r5, &(0x7f0000000300), 0x0, 0x8000, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000200)={'gretap0\x00', {0x2, 0x4e20, @rand_addr=0x80}}) close(r5) pipe2$9p(&(0x7f00000003c0)={0xffffffffffffffff}, 0x85800) r7 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setreuid(r9, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0}, &(0x7f0000000a00)=0xc) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x200000, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@access_user='access=user'}, {@access_uid={'access', 0x3d, r9}}, {@version_L='version=9p2000.L'}, {@aname={'aname', 0x3d, 'gretap0\x00'}}, {@aname={'aname', 0x3d, 'HL\x00'}}], [{@appraise='appraise'}, {@appraise='appraise'}, {@euid_lt={'euid<', r10}}]}}) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000080)=""/130, 0x82}, &(0x7f0000000140), 0x40}, 0x20) r11 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r11, 0x400448cc, &(0x7f0000000000)="21f1ba34") getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000440)={'HL\x00'}, &(0x7f00000004c0)=0x1e) unshare(0xc040400) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 18:52:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x9) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x4182) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, &(0x7f0000000040)) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x80000001, 0x20000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x11}], 0x1, 0x81805) r6 = dup2(r4, r4) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40c002, 0x0) r8 = semget(0x0, 0x0, 0x200) semctl$SEM_INFO(r8, 0x1, 0x13, &(0x7f0000000180)=""/115) ioctl$NBD_DO_IT(r7, 0xab03) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r6, r3, 0x0, 0x2400003e) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='com.apple.system.Security\x00', &(0x7f0000000240)=""/174, 0xae) 18:52:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380)='vxcan1\x00', 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/\x00~WMz\x0f0\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xe8\xd3\x83dx-c\xb6a(T\xb2\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e\t\x00\x00\x00\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\n\xd8\x1e\xd8\xda2NDcq\xef\x1eu\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xeb\x8e\x14\x03w\xaao\xb3\x17\x00\xf18\xdcM~\b\xd5|(*g\xdeZu\xc5G\x1f\x81\x00\x00\x00\x00\x00\x00\x00\x9bS\x98\x17\xdb\xa7\x7fK\x93\xcf\xe7-\x19\\I\x1f\xb6\'d\xfce\x92\xe0m\xd0\xa7\xf6:\xbb\xd4\xc6\xe3/_\xa1\x9fnM\xc0t\xd8$\xfc|i\x80@\xc7\xe8\xb2q6\xfa\xd5~b\x89B\xb4i\xeeGh\\\x94\"\xbf\xc1\x99*Lv\xa4\xa3\x91&\xd2\x14\x02\xb9g-*\xa0\xf8\x9b\x04,\xa8\x98%-\x1e%\xf8L\x01\xbe\x87\xd4\x8c\x9d\x9c\r9\xfb#\x1d\xd7\xc0\xe6E\x81\x16c\xeaN\xb8\xfb\x06\xd2\x01\a\xc7\x9e\xb1\x85Xu\xc9v\xe58\xe6\xe3\xf3\x16\xc4\x88\x03%M3\xec=c\x84\xeb\xc2\xb0\x87\xfdb\xa9\xa4\xe6\xd8\xe5\xeaq/\x1e\xbcW\xec+', 0x0, 0x0) close(r2) r3 = socket$key(0xf, 0x3, 0x2) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r3) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, 0x0, 0x0) write(r4, 0x0, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0x0, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, 0x0, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200040, 0x0) sendto$inet6(r7, 0x0, 0x1b19afe7895edebd, 0x24008011, &(0x7f0000b63fe4)={0xa, 0x2, 0x4000, @ipv4={[], [], @remote}}, 0xfffffffffffffeff) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfe0c, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f00000001c0)=""/122, &(0x7f0000000140)=0x7a) 18:52:05 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000140)={0x0, 0x8000, 0x7f, [], &(0x7f0000000100)=0x40}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$VIDIOC_G_PARM(r3, 0xc0cc5615, &(0x7f0000000300)={0x2, @output={0x1800, 0x1, {0xb43f, 0x5c7}, 0x4, 0xf0}}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:05 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='system_u:object]r:crond_exec_t:s0 sysadm_u\x00'], 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) chdir(&(0x7f00000002c0)='./file0\x00') r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x81) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r5 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$TIOCLINUX3(r5, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r6, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r6, 0x2284, 0x0) [ 382.133950] kauditd_printk_skb: 4 callbacks suppressed [ 382.133959] audit: type=1400 audit(1570387925.629:198): avc: denied { bind } for pid=14658 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 382.168186] Unknown ioctl -1071098327 18:52:05 executing program 3: getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0xf, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x24, 0x5, 0x3, 0x0, [{}, {[@broadcast], 0x1f}, {[], 0x8}, {[@broadcast], 0xa6f}, {[], 0xfffffffb}, {[], 0x1000}]}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x1}}}}}}}}, 0x0) 18:52:05 executing program 4: mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x4, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x282000) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f00000001c0)) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) ioctl$MON_IOCG_STATS(r3, 0x80089203, &(0x7f0000000100)) r4 = shmget(0x2, 0x1000, 0x78000000, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000140)=""/47) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe101}, [@IFLA_LINKINFO={0x20, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8}], @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}]}, 0x40}}, 0x0) [ 382.216510] Unknown ioctl -1071098327 18:52:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200000, 0x8) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_mr_cache\x00') semget$private(0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x4000) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x8) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) write$P9_RXATTRCREATE(r2, &(0x7f0000000180)={0x7, 0x21, 0x1}, 0x7) 18:52:05 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000100)={r3}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:05 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}], [], 0xf603000000000000}) 18:52:05 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="2cae7186000000f84582a70a7afb01000000000000cd15c0d03382919b617206f48845890700000000000000e8b754ef30d4dd35d51cf34dd9d3d813f42ab79cc1d9cda1a29a418083b6195c556fdb8a66daecad9c00e56116bfb42854921ca0bda45c12760349355e2f2f13e72b3eb6e800f2a49bd830c06a1b2e65c9068100000000000000550a2b47b490af76634e4c84fcbac36af36ca1440388ce9a0820958790ebe2bbd51843ad4eb14e041bb633ceca744890a009f0a0af8f50b5fcfc12db67"], 0xc3) r0 = socket$inet6(0xa, 0x3, 0x3c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@mcast2, @mcast1, @remote, 0x4b, 0x0, 0x6, 0x100, 0xff, 0x280000, r1}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) io_setup(0x3b24, &(0x7f0000000740)=0x0) io_submit(r2, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) [ 382.506886] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 18:52:06 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="850010002f000000570000000000fc2c7d16e4af994d0c6300009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x48) socket(0x0, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x408000, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000340)={r3, &(0x7f0000000280)=""/166}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x21, 0x0, &(0x7f00000003c0)="a3375f83c52586010000805c8c2fb869f471da58a7edc9cd8103b7c5afcc7ba3af", 0x0, 0xaad}, 0x40) 18:52:08 executing program 1: lsetxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=@random={'security.', '/dev/vsock\x00'}, &(0x7f0000000580)='ip6tnl0\x00', 0x8, 0x1) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x844b00a3f63b7f5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000004c0)={0x2, 0x0, &(0x7f0000000100)=""/234, &(0x7f0000000300)=""/213, &(0x7f0000000400)=""/185, 0x4000}) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) r4 = accept4$inet(r3, &(0x7f00000005c0)={0x2, 0x0, @dev}, &(0x7f0000000600)=0x10, 0x0) sendfile(r2, r4, 0x0, 0x585a532e) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r5, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:08 executing program 4: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00'], 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x204080, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x6, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x87ff7) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b0b, &(0x7f0000000600)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x0e\x00\x00\x00\x00\x00\x00\x00!\a\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\a\x00vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x99\xb9j\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0X\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x990\xcei\xf2\xd1\x04\xde\xaa\xfa\xc0\xe9c\x81\x86\xc3j2m\xf6B\x19=h\x8fe\xc2\x13\x92?||\xbf\x10\x8f$\xdf^\xba\x04^\x13\r}\xd2n?3O\xb5\xa8\xfa\xfe\xe6\x92\xfd\x1c\xbc\x15\x81G\xbeC\xb2\x80\x87\x83\xb6\xf7wz\xcf\xa3c\xac\xe56\x8cg\x15\x9e\x96c') ioctl$VIDIOC_ENUMAUDIO(r5, 0xc0345641, &(0x7f0000000040)={0x5, "2a43e10f4623c66188d71214bddffd301c65c17f08ed8d71101645263f95442c", 0x1, 0x1}) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) 18:52:08 executing program 0: r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x4a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000240)=0x5) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f00000004c0)=0x6) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000400)=""/180) bind$isdn_base(0xffffffffffffffff, &(0x7f0000000040), 0x6) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="2f6465762f6e756c6c62300046725c6012ee375d54e0b2596dd07830b914d02eb75bfe1bdff97ac275cb63884eba7399f1217a2d2498cd0918ffb546f272be7db7a0de212ab58895d1"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440)=r0, 0x4) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) lookup_dcookie(0xd168, &(0x7f00000002c0)=""/137, 0x89) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/pid\x00') 18:52:08 executing program 3: chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000a00)=[{}, {}]}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000200)=0xfffffffc, 0x4) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000005c0)) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) getdents64(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2e00200000000000f1af00000000e90009040000000085000200"], 0x1a) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="16aa38556cca81a3f171ad659f7d7f2989ced4fb412171dc3aafc6c2c16210d63e443ee90f5550a79247877e69c2479a7a61b520126567382f580c855c7ae3548459cd7da205892ba4365a8b197ae5f64c14dd02cb089af4a345a929c66d8e7435a2e41e13267d6eea9e6f19f2c5047abb9a659c06bbfc0df2da51f5", 0x7c, 0x4000, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000b00)={0x0, 0x1, 0x30, 0x40, 0xe5}, &(0x7f0000000b40)=0x18) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000c40)={r2, 0x8000, 0x7f, 0x200, 0xc4, 0x2}, 0x14) pivot_root(&(0x7f0000000340)='./file2\x00', &(0x7f0000000440)='./file1/file0\x00') mount$9p_virtio(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000500)='./file1/file0\x00', &(0x7f0000000600)='9p\x00', 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="7472616e733d76697274696f2c70726976706f72742c6163636573733d757365040000007273696f6e3d3970323030302e752c6163636573733d636c69656e742c636f6e746578743d73746166665f752c646f6e745f6d6561737572652c646f6e745f686173682c7365636c6162656c2c61707072616973655f747970653d696d617369672c746f6e745f61707072616973652c61707072616973655f747970653d696d617369672c00"]) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x6, 0x200) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000800)={0x0, &(0x7f00000007c0)}) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000840)) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000d80)={0xff9ffff, 0x6db, 0x0, [], &(0x7f0000000d00)={0xa30001, 0xfffffffe, [], @p_u16=&(0x7f0000000c80)}}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000680)) socket$caif_stream(0x25, 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000e80)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000dc0)="b2968464b9bdfb1a621002115666892e7a4155816359e5f65a63ed5a80ef2fc2d0426622a5db39ccd18528ad24a06503523e4e527b0dc27ef26dd20ad5c1ca74888f24f83ee9d0c7bacce89af544f1284bfc6bce2edd85d59e3e915f20d0bb47df018a912b757c69c97000fbd972db72204ef85dbe1d720d5be9c237d45e514ec8c2eff9ac", 0x85, r3}, 0x68) recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f00000003c0)=""/115, 0x73}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000840)=""/217, 0xd9}, {&(0x7f0000000a40)=""/148, 0x94}], 0x2}, 0x40}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000000b80)=""/47, 0x2f}, {&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/90, 0x5a}, {&(0x7f0000000cc0)=""/38, 0x26}], 0x4, &(0x7f0000002e00)=""/178, 0xb2}, 0x3}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {0x0}, {&(0x7f0000003040)=""/30, 0x1e}, {0x0}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x6}}, {{0x0, 0x0, 0x0}, 0xfffffffffffffffd}, {{0x0, 0x0, &(0x7f0000007040)=[{0x0}, {&(0x7f0000006f40)=""/255, 0xff}], 0x2, &(0x7f0000007080)=""/57, 0x39}}, {{&(0x7f00000070c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000007500)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x4}, {{0x0, 0x0, 0x0}, 0x2}], 0x9, 0x1, &(0x7f0000008b40)) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:52:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='system_u:object]r:crond_exec_t:s0 sysadm_u\x00'], 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) chdir(&(0x7f00000002c0)='./file0\x00') r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x81) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r5 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$TIOCLINUX3(r5, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r6, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r6, 0x2284, 0x0) [ 385.174610] ntfs: (device nullb0): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 385.198936] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. 18:52:08 executing program 1: syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x5, 0x80) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)=0x0) sched_getscheduler(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 385.218946] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 385.259725] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. 18:52:08 executing program 0: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="1020f5f20900070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000f1ffffff0100000002", 0x69, 0x1400}], 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x204000, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xe) [ 385.354106] ntfs: (device nullb0): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 385.374605] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 385.411119] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 385.480702] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. [ 385.526712] f2fs_msg: 6 callbacks suppressed [ 385.526723] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 385.545251] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 18:52:09 executing program 1: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_NL_BEARER_SET(r1, 0x0, 0xc8045) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vsock\x00', 0x400000, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000041c1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000040)={0x0, 0x3000, 0x0, 0x8, 0x40000017}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'nr0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r4, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 385.594721] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 385.634531] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 385.653750] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 385.702584] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 385.739935] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 385.776135] audit: type=1400 audit(1570387929.259:199): avc: denied { create } for pid=14760 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 385.782552] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 18:52:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={'netdevsim0\x00', {0x2, 0x4e24, @rand_addr=0x6}}) ftruncate(r1, 0x8200) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) recvmmsg(0xffffffffffffffff, &(0x7f0000006280)=[{{0x0, 0x0, &(0x7f0000003a40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) [ 385.824248] bond0: Error: Device is in use and cannot be enslaved [ 385.894887] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 385.915681] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 18:52:09 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) mq_timedreceive(r0, &(0x7f0000000100)=""/247, 0xf7, 0x3, &(0x7f0000000300)={0x0, 0x989680}) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$CAPI_GET_PROFILE(r3, 0xc0404309, &(0x7f0000000280)=0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:09 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r3, 0x407, 0x200006) splice(r2, 0x0, r3, 0x0, 0x55aa40be, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x4e24, @rand_addr=0x4}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000100)={0x81, 0x4, 0x4, 0x2, 0x139, 0x9, 0x8}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:09 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) mq_timedreceive(r0, &(0x7f0000000100)=""/247, 0xf7, 0x3, &(0x7f0000000300)={0x0, 0x989680}) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$CAPI_GET_PROFILE(r3, 0xc0404309, &(0x7f0000000280)=0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x28002, 0x0, 0x0, 0x5}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = memfd_create(0x0, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/.yz1\'\xff@\x8a?\x9b+\xfc\xb5\x9fq!\xdb\xfb\xb2\xd8Om\x84k\xca\x82\xd9\xb2$\xd4\xda\xba\xc9\x0eb\xb4D\x04\xe4\x82\xe0\xe2p\x99\xb5\xc8J\xe3B.y\x17\x1ae!n|\x8a\xd2k\x04\x94$$\xb6\x1c@c\x86\xf4\xcc\xfc;t;[\xab7\xf0\xb8\xd8\xbb\a\xe9]\xef\x11i', 0x1ff) r2 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) dup2(r2, r1) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0xc05c6104, 0x0) r3 = creat(&(0x7f0000000640)='./file0\x00', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r4, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) write$cgroup_type(r3, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r3, 0x3, 0xc000, 0x80000003) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000000)) r6 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x6, @tid=r6}, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f0000000500)) socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x886, 0x0) r7 = socket$inet6(0xa, 0x80000, 0x88) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000600), 0x0) open$dir(&(0x7f0000000040)='./file0/../file0\x00', 0x10001, 0x20) r8 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f00000001c0)=0x8) socket$inet6(0xa, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) acct(&(0x7f0000000180)='./file0\x00') mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 18:52:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)='syzkaller\x00', 0xffffffffffffffff}, 0x30) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b6558", 0x0, 0x100, 0xf2ffffff}, 0x28) 18:52:11 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x612, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xc0}, 0x48) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) accept$nfc_llcp(r2, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x370800000000, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 18:52:11 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x8db9) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 18:52:11 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, @perf_bp={&(0x7f0000000100), 0x7}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x564b6a8cd4251378) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000000)='.\x00', 0x111c00, 0x0) r5 = shmget$private(0x0, 0x2000, 0xcc, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r5, 0x3, &(0x7f0000000200)=""/232) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) r6 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4, 0x490080) sendfile(r6, r2, 0x0, 0x8000fefffffa) [ 388.213027] kauditd_printk_skb: 1 callbacks suppressed [ 388.213036] audit: type=1400 audit(1570387931.709:201): avc: denied { map } for pid=14796 comm="syz-executor.3" path="socket:[57629]" dev="sockfs" ino=57629 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=udp_socket permissive=1 18:52:11 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000340)={&(0x7f0000000140), 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x1c, r1, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0xfd9f53674b4b6085}, 0x2080) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') mkdirat$cgroup(r2, &(0x7f0000000380)='syz1\x00', 0x1ff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:12 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r2, &(0x7f0000000340)="1c3a90e169654f28d7b358f8ec6554c705b2662265b8ee22e00bf4f19412e98824ab9cd49b22d6a132b7f2d1b13fad17969902cfd48c5691d19d9445328d6cdcace2444ba841b9d3a47f7832f39262d6222240c1c0d8780c7112a8676cc6da0390df2f2fe9d15d19ee47145dfefc2392e3efe476227819d1148126a79aa867b657ae2801bf97c78d0b6d4ee45fbc09bbd791c9d02e2f698cf410daa68a513868031ad02a86d4c07fcf77438fbd9d99054070eac5e1016c0d98841387f3c41e5f91673d00e6f592f5de71c0a45fce8f35238b0e793425c22cffefa87cd0e2702c0573e8aae945322bb2eeb8f3d81f96", 0x191510e) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r6 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r6, 0x0, 0x7fffffa7) [ 388.529048] Process accounting resumed 18:52:12 executing program 3: gettid() msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000580)=""/108, 0x6c}], 0x2) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x6, 0x40000) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)='./file1/file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000280)={0xe, 0x6, 0x1f, 0x0, 0x12, "8eb5935c2940fd1ba4871d1031b533e02848"}, 0x1e) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) link(&(0x7f00000001c0)='./file1/file0\x00', &(0x7f0000000240)='./file2\x00') lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file1/file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x2000, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="6d657461636f70793d6f6e2c696e646578396f66662c64656661756c745f7065726d697333a356713d2773696f6e732c6e66735f6558706f72743d6f66662c6e4a735f6578706f72743d6f66662c704a72a34a855bae04168b806d69745f646972586374696f2c6f626a6f7c515fe97c019a5f757365733d2f6465762f6c6f6f"]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffe30, 0xfa00, {0x0, &(0x7f00000000c0), 0x0, 0x2}}, 0x297) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000a40)=ANY=[@ANYBLOB="010000003f000000fcffffff0000050001000000000000004477674520ed72d0f336184779133cbd7d616c77a1839f65302ce79c123bf9a07ce2b33d0534b797e9948a17394a593b896162216997586967cbe7f945b218a8679ef5a55e42eca0ad24a23978237b719f0f0c9bbfef8c6edecd94b206d0fc02646963ad20cc0cfd375f22d6f51db2264092c7352c6f15fbe335312f11a3a9c65e4c3d2a9fdb486cc1c198847bcee4275a1a85d738c57bb4"]) close(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e24, 0xdffffffd, @ipv4={[], [], @broadcast}, 0x7fff}, r2}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0xfffffffffffffcf7) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) sendto$isdn(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="0100000000000000dd8198f8cd3de958a6283bae3adeaba1146b5d5dc6607c45f330b64c96816236f29cc057866579d5a174f47446af9d4abed93da1ad4c1cdfb6579b28a13987d5dbb98439041acf05541e2d3083d9dfd653eed581a63dc13441adc03c8bfb5ea13c5a9d69fc9d1b7bc26f1bf69a0a551dfb2c724445423430614c4f9d76cbf8a1b4034cb4778ab5db0fd5a1fe2d4c6ceebf97704a9340b48938d8e520a3c0f6f7a0b30276236f03c043f58ee51da4d72f18e579ae8f82675c38a23893147656505cca5d863a0fa74ac7fa52990c6d609cfd8f1a742730573c5e4daa5fb11554f083e74a031fb2cae4"], 0xf0, 0x0, &(0x7f0000000980)={0x22, 0x1, 0x7, 0x1f, 0x5}, 0x6) openat(0xffffffffffffffff, &(0x7f00000006c0)='./file2\x00', 0x80000, 0x2) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x38d00c92cff06ac5, &(0x7f0000000140)=""/170, 0x0) 18:52:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c00000010000108000000524048c9bb4d3378d2", @ANYRES32=0x0, @ANYBLOB="000000000000000014001600100001000c000700000000000000000008001b0000000000"], 0x3c}}, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) [ 388.599331] audit: type=1800 audit(1570387932.089:202): pid=14834 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17057 res=0 [ 388.613293] Process accounting resumed 18:52:12 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000001180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x102, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000225000/0x2000)=nil, 0x2000, 0x1000000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00002, 0x1, 0x0, 0x0, 0x2000000000002) close(0xffffffffffffffff) 18:52:12 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') r2 = accept$ax25(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @bcast}, [@bcast, @default, @bcast, @remote, @remote, @netrom, @bcast, @rose]}, &(0x7f00000001c0)=0x48) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f00000003c0)='./file0\x00', 0x8, 0x7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000400)={'sit0\x00', 0xac8}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 388.763121] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 388.831146] EXT4-fs (loop2): bad geometry: block count 580964351930795064 exceeds size of device (66048 blocks) [ 388.845546] mmap: syz-executor.4 (14851) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. [ 388.881518] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 388.946832] overlayfs: unrecognized mount option "metacopy=on" or missing value [ 388.974005] Unknown ioctl 35106 [ 389.027521] Unknown ioctl 35106 [ 389.125860] overlayfs: filesystem on './file0' not supported as upperdir 18:52:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000002c0)=""/66, 0x0) semget$private(0x0, 0x0, 0x0) write$P9_RCREATE(r1, &(0x7f0000000480)={0x18, 0x73, 0x2, {{0x65c4c73d2098ce3a, 0x0, 0x6}, 0x1f}}, 0x18) getresuid(0x0, &(0x7f0000000440), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) fsetxattr$security_evm(r2, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "ffa8d9"}, 0x4, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000280)={0xc, 0x4}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f0000000040)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 18:52:14 executing program 2: syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="5be81d6a5512fe29fefd1be86796"], 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0xfffffffd, @dev, 0x7}}}, 0x84) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xa3, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(0x0, 0x8, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000002c0)) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 18:52:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='oom_score\x00') ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x13) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x2, 0x9040) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40000, 0x100) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) setsockopt$TIPC_MCAST_BROADCAST(r4, 0x10f, 0x85) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x800000000004) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000080)={0x100, 0x280000, 0x7, 0x1, 0x8, 0x7f, 0xe7, 0x0, 0x0, 0x7, 0xca8, 0x10000}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r6, 0xc018620c, &(0x7f0000000100)={0x3}) socket$can_raw(0x1d, 0x3, 0x1) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00a7a2be4d30c2762a09c2c83c3f66a2e912000c000100626f6e64"], 0x3c}}, 0x0) 18:52:14 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x80, r1, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x6c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc0000000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xb9f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x8050}, 0x8084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) sendmsg$nl_route(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv6_getrule={0x20, 0x22, 0x800, 0x70bd2b, 0x25dfdbfd, {0xa, 0x0, 0x10, 0x40, 0x1, 0x0, 0x0, 0xd2996622c11d8a84, 0x10}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x880) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000001700)={'nat\x00'}, &(0x7f0000001780)=0x78) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x200, 0x24) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) r2 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x0) prctl$PR_MCE_KILL_GET(0x22) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000600)={0x0, 0x0, 0x4, 0x4, {}, {0x0, 0x2, 0x81, 0x7f, 0x0, 0x1f, "faae543c"}, 0x0, 0x3, @userptr, 0x4}) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0xf, 0x0, {{0x0, 0x4}, 0x7}}, 0x18) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x40a02, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000080)={0x0, 0x0, {0x1, 0x0, 0xffff2900, 0x0, 0x4}}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond0\x00', 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 18:52:14 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xf0ff7f00000000) 18:52:14 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) lookup_dcookie(0xeb4d, &(0x7f0000000100)=""/202, 0xca) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000300)={'vlan0\x00', {0x2, 0x4e24, @multicast1}}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000740)=0xc, 0x4) sendto$inet(r0, 0x0, 0x1ee0ccc820e03fee, 0x0, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x1e0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000100)=0x80) sendto$inet(r0, &(0x7f0000000480), 0x3e364e6a1608b588, 0x48c04, 0x0, 0x0) socket$inet6(0xa, 0xa, 0x2) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) shutdown(r0, 0x1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000180)=0x8) 18:52:15 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffff48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil) mprotect(&(0x7f00002ae000/0x2000)=nil, 0x2000, 0x10) bind(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000040), 0x4) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) finit_module(r2, &(0x7f0000000140)='lo\x00', 0x0) getsockname$tipc(r0, 0x0, &(0x7f00000001c0)) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) listen(r1, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x400, 0x3f, 0xffff, 0x5}, 0x8) sendmmsg(r4, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x3f}) 18:52:15 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 18:52:15 executing program 0: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) lookup_dcookie(0xeb4d, &(0x7f0000000100)=""/202, 0xca) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000300)={'vlan0\x00', {0x2, 0x4e24, @multicast1}}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 391.857055] audit: type=1400 audit(1570387935.339:203): avc: denied { name_bind } for pid=14901 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 392.016234] audit: type=1400 audit(1570387935.349:204): avc: denied { node_bind } for pid=14901 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 392.160448] audit: type=1400 audit(1570387935.399:205): avc: denied { name_connect } for pid=14901 comm="syz-executor.2" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:52:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0xf0ff7f00000000) 18:52:17 executing program 1: ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000440)={0x7, 0x10, 0xa, 0x1d, 0x2, 0x800, 0x3, 0x5}) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x1000, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x6, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x7, 0x9, 0x401}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x8}}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getpid() sendmsg$nl_route(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001300020028bd70000000814d365c5630405a555ec44b89c2eab40000000000000629baf92a50420eb159f65d475d988211dcb3bfcf55db9f05e8b7e8", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0xffffffffffffffbd}}, 0x0) 18:52:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x4c0000, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480)={0xffffffffffffffff}, 0x2e, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000500)={0x13, 0x10, 0xfa00, {&(0x7f0000000600), r3}}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000280)) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f00000000c0)=0x8, &(0x7f0000000100)=0x2) r5 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) fcntl$setstatus(r5, 0x4, 0x46000) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x40, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$TCSETX(r8, 0x5433, &(0x7f0000000440)={0xc4, 0x1, [0x0, 0x7, 0xff, 0x7, 0x1], 0x9}) ioctl$SCSI_IOCTL_PROBE_HOST(r4, 0x5385, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r6, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4", 0x5}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r5, r5, 0x0, 0x2000005) r9 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) socket$inet_udplite(0x2, 0x2, 0x88) getresuid(&(0x7f0000000200), &(0x7f0000000240), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) setresuid(0x0, 0x0, r10) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x0, 0x0, 0xec, 0x80, 0x66, 0x44}}, 0x8) 18:52:17 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffff48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil) mprotect(&(0x7f00002ae000/0x2000)=nil, 0x2000, 0x10) bind(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000040), 0x4) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) finit_module(r2, &(0x7f0000000140)='lo\x00', 0x0) getsockname$tipc(r0, 0x0, &(0x7f00000001c0)) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) listen(r1, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x400, 0x3f, 0xffff, 0x5}, 0x8) sendmmsg(r4, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x3f}) 18:52:17 executing program 3: syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="0200eeffffff01000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x4e23, @loopback}]}, &(0x7f0000000100)=0x10) 18:52:17 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffff48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil) mprotect(&(0x7f00002ae000/0x2000)=nil, 0x2000, 0x10) bind(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000040), 0x4) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) finit_module(r2, &(0x7f0000000140)='lo\x00', 0x0) getsockname$tipc(r0, 0x0, &(0x7f00000001c0)) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) listen(r1, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x400, 0x3f, 0xffff, 0x5}, 0x8) sendmmsg(r4, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x3f}) 18:52:18 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) getdents64(r0, &(0x7f0000000180)=""/146, 0x92) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@newsa={0x180, 0x10, 0xb2d, 0x0, 0x0, {{@in=@broadcast, @in=@multicast2}, {@in=@empty, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ctr-serpent-avx\x00'}}}, @algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x180}}, 0x0) 18:52:18 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) sendfile(r0, r1, 0x0, 0x8000fffffffe) r2 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0xc) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$KVM_NMI(r3, 0xae9a) fadvise64(r2, 0x0, 0x0, 0x4) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x20040010) 18:52:18 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet(0x2, 0x803, 0x1) splice(r1, 0x0, r2, 0x0, 0x8001, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="61576714841872cfdcc7ed8f9d4339de5a72d2d80fb1215727fb347ad3027574599e0df156a4e03026337734cf862af9e0838535808ae879acf09fd5eded106048d07b59fc8d21cd710bc2a2cbcd5541e3f4950e8b50e7704caa96a2a53b13c97da2168af3a8a0a98a8c1c1dff20ed0baed4775dcb02628fd0372d2f0c3b", @ANYRES32=0x0], &(0x7f00000001c0)=0xfffffffffffffeae) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x2, 0x0, 0xcecc, 0x40, 0x8001, 0x7fffffff, 0x5, {r5, @in6={{0xa, 0x4e22, 0x6, @rand_addr="fae239c55e0314feb8fd1465fe999cb9", 0x6}}, 0x0, 0x9, 0x3f, 0x2000f53}}, &(0x7f0000000500)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r5, 0x8e, 0xfff}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r5, @in6={{0xa, 0x4e23, 0x800, @mcast2, 0xd1e5}}, 0x81, 0x64d7}, 0x90) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r6, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 394.660793] ldm_validate_privheads(): Disk read failed. [ 394.666260] Dev loop3: unable to read RDB block 1 [ 394.695782] loop3: unable to read partition table [ 394.700935] loop3: partition table beyond EOD, truncated [ 394.766936] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 394.846089] audit: type=1804 audit(1570387938.339:206): pid=14964 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir894535329/syzkaller.qFUPsg/219/bus" dev="sda1" ino=17041 res=1 18:52:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="8004ec1f5984b2632994dfb2c601355763acefc2ebea7e7de8e70300003c42780e1fbf8f041400d8fc279f7c1deadb2487d9b2d074101b09cfb5fe9f49d84307a9f40540c883e9d61383edd1b2646252a37311c78c513f94cba1742f3aa61c249af177e7207003e7997fdbd005cd83312d00"/127], 0x3e) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={r0}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001640)=[{&(0x7f0000000180)=""/218, 0xda}], 0x1, 0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000f662dd6a2875f6060000896cdafc1834e8c4388fbaf888d71edadd5cb45ac1ad529e81fb10ff038438fd0000000000000000000000e5ffffff00", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000480)={r5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000006c0)=ANY=[@ANYRES32=r5, @ANYBLOB="270e0a00090005007f0004000400377c25c1440511666800"], &(0x7f0000000700)=0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000740)={r6, 0x1ab, 0x8}, 0x8) getsockopt$TIPC_NODE_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x83, &(0x7f0000000140), 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000280)) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r7) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080), 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000580)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r8 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r8, &(0x7f0000000780)=&(0x7f0000000680)={&(0x7f0000000440)={&(0x7f0000000040)}, 0x0, &(0x7f0000000640)={&(0x7f0000000600)}}, &(0x7f00000007c0)=0x18) [ 395.023210] audit: type=1804 audit(1570387938.519:207): pid=14957 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir894535329/syzkaller.qFUPsg/219/bus" dev="sda1" ino=17041 res=1 [ 395.233327] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 395.246638] FAT-fs (loop0): Filesystem has been set read-only [ 395.253263] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 18:52:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000040)=0x200, 0x4) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) chroot(&(0x7f0000000000)='./file0\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff72) 18:52:20 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b64691b3d2e2f66696c65315c008a97dca7dd8bbe42302f6227ccd19733e4eabb492293135abf5e8fc5e1a2e9a92975d6bba37e2271505832df0ea2b655f4c76776f7f637dcb8b8fd0013f43f1b1b61f966a7acfb87af080f85327e76fc01feb94458877cb96c9c6bb6ccd44137276ebd90d6ef441d6697fdd097de65524473c49abaae6bfb3b1ab606f92e96be92cb45e2a9351ec1502c407aefa6db3200ecbb55bc521587eb2d0032c4519354ded5958b71f80ffa78ddffb8965ad81392739ef668e4"]) 18:52:20 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x80000000) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x4000, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000008c0)={0x0, 0x0, 0x30}, 0x0) msgget$private(0x0, 0x80) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x7a}, &(0x7f0000000100)=0x8) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="580000000000000014010000070000000300000004000000", @ANYPTR=&(0x7f0000000640)=ANY=[], @ANYPTR, @ANYBLOB="0100000000000600000000000000000008000048f0f59a42b473dd000000000070000000000000000200000000000000"], 0x58, 0x1}, 0x0) 18:52:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) lsetxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, 0x0) semget$private(0x0, 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18, 0x73, 0x2, {{0x65c4c73d2098ce3a, 0x2, 0x6}, 0x1f}}, 0x18) getgid() r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4cb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000280)={0xc, 0x4}) fcntl$setownex(r1, 0xf, &(0x7f0000000100)={0x2, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(r6, 0x400448c9, &(0x7f0000000340)={{0x0, 0x4, 0x3, 0x0, 0x2, 0x8}, 0x66}) ioctl$KVM_RUN(r5, 0xae80, 0x0) mkdir(0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, 0x0) 18:52:20 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000180)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 397.346034] overlayfs: unrecognized mount option "workdi=./file1\" or missing value [ 397.368822] atomic_op ffff88809b8de180 conn xmit_atomic (null) [ 397.394638] overlayfs: unrecognized mount option "workdi=./file1\" or missing value 18:52:20 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4480, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000080)={0x3f, 0x2}) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb89e7ff23ae8bc98cd134d3afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="757372018000000000000000"]) 18:52:21 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) r1 = open(&(0x7f0000000400)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x40, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x20, 0x80000) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/243}) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000010}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x10, 0x70bd25, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4005) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r5, 0x28, 0x6, &(0x7f0000000780)={0x77359400}, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10800020}, 0xc, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="36030000aa8de9237d36cfaa64140eb3a2810000000000000016916540b912f65163000000", @ANYRES16=r2, @ANYBLOB="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"], 0xfffffffffffffd5b}, 0x1, 0x0, 0x0, 0x100}, 0x20048001) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) sendmsg$IPVS_CMD_SET_SERVICE(r6, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8040}, 0xc, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a8000000", @ANYRES16=0x0, @ANYBLOB="000228bd7000fedbdf2502000000400003001400020062726964676530000000000000000000080008100600000008000100010000000800030003000000080007004e200000080005007f00000108000500020000000800050001000000080006001100000008000400fcffffff340001000c00070034c4a8671800000008000b0073697000080008000900000014000300ffffffff00"/162], 0xa8}, 0x1, 0x0, 0x0, 0x20000010}, 0x26010010) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) r8 = dup3(r7, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r8, 0xc0405519, &(0x7f00000007c0)={0xa, 0x0, 0x8, 0x9, 'syz1\x00', 0x1000}) 18:52:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) flistxattr(r3, &(0x7f0000000080)=""/117, 0x75) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1f, 0x0, &(0x7f0000012ffc)=0x80fb268a) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) ioctl$VIDIOC_SUBSCRIBE_EVENT(r6, 0x4020565a, &(0x7f0000000100)={0x8001006, 0x5, 0x1}) dup3(r2, r1, 0x0) 18:52:21 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:21 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x145042, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x2}, 0x43c5) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$P9_RREAD(r0, &(0x7f00000002c0)=ANY=[@ANYPTR], 0x8) fcntl$setstatus(r6, 0x4, 0x6100) fdatasync(r2) ftruncate(r6, 0x8200) write$cgroup_type(r6, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000a80)={0x0, r2, 0x0, 0x0, 0x0, 0x83}) r7 = open(&(0x7f0000000000)='./bus\x00', 0x4100, 0x0) sendfile(r0, r7, 0x0, 0x8000fffffffe) 18:52:21 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 397.797561] audit: type=1800 audit(1570387941.289:208): pid=15033 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16916 res=0 [ 398.024541] audit: type=1804 audit(1570387941.519:209): pid=15041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir894535329/syzkaller.qFUPsg/222/bus" dev="sda1" ino=16916 res=1 [ 398.129930] audit: type=1800 audit(1570387941.519:210): pid=15041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16916 res=0 [ 398.156127] audit: type=1800 audit(1570387941.569:211): pid=15033 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16916 res=0 [ 398.198196] audit: type=1804 audit(1570387941.689:212): pid=15041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir894535329/syzkaller.qFUPsg/222/bus" dev="sda1" ino=16916 res=1 [ 398.225531] audit: type=1800 audit(1570387941.689:213): pid=15041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16916 res=0 18:52:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:23 executing program 3: r0 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x10) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0xffffffffffffffda, 0x3, {0x7, 0x1f, 0x1, 0x80000, 0x40, 0x5, 0x5, 0x1}}, 0x50) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0xd180) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r1, r2, 0x0, 0xe, &(0x7f00000001c0)=':]#vboxnet1,-\x00'}, 0x30) r4 = syz_open_procfs(r3, &(0x7f0000000240)='net/ip6_flowlabel\x00') write$selinux_access(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x50) fcntl$setown(r0, 0x8, r3) mknod$loop(&(0x7f0000000280)='./file1/file0\x00', 0xc000, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x2000) getsockname$unix(r5, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) setxattr$security_ima(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.ima\x00', &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0xfc9, 0x0) 18:52:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0x21000000802}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @loopback}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @loopback}, 0xc) r4 = socket$nl_route(0x10, 0x3, 0x0) dup3(r4, r1, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r7 = socket$inet(0x2, 0x803, 0x1) splice(r6, 0x0, r7, 0x0, 0x8001, 0x0) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r9, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r8, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x5, 0x0, 0xcecc, 0x40, 0x80000001, 0x7fffffff, 0x5, {r9, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x9, 0x3f, 0xf53}}, &(0x7f0000000500)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000080)={r9, 0x8e, 0xfff}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000000100)={r9, 0xc2, "1cf11499dca343bdeec33be7d38d40f66a18eb34a71f5bb98827460ccb1ef4f1aadb25356aca7fcb26aa39f8ba9245366e26128b7873cd98d0b4690cb660c6350bc61bbd288c2b5e38da61a87bca380fb4fad8d5da6d88dd8bb558bb1422bc20370a494e5a5460574e5d3eabb8d09fc5c40d6218680388ce06d2fe9c771614a8a5ef08b8828d47cb6910b0cb9e9719e23ccf36d75896ca1075eea11bfdf626c907b319f775b8d7e1aa71624d0bdd92197bca1808ba872548890474a8d6178349887f"}, &(0x7f0000000200)=0xca) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000540)={@in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x3, 0x0, "5e0ab2844fd4c64e79b050a7e7510816e6a2c34faf0740f0f0173e2fff5c074c7b9ce9516c1f631adc8ae894f12e28199e5326b12c561db8b3a36beec496b42e5d9b4a4ebede12f0192fb67e3c2efda0"}, 0xd8) 18:52:23 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0xffde, @local, 0xa1}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000440)={r3, 0x1f, 0x10, 0x8000, 0x1f}, &(0x7f0000000480)=0x18) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x28) tkill(r0, 0xc) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r4, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r6, 0x0, 0x0) ioctl$KVM_GET_SREGS(r4, 0x8138ae83, &(0x7f0000000300)) lseek(r6, 0xfffffffffffffffe, 0x1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) ioctl$FICLONERANGE(r6, 0x4020940d, &(0x7f0000000100)={r7, 0x0, 0x0, 0x20009, 0x5}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:23 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000001800)=ANY=[@ANYBLOB="5f454c44065b050073115606a4ec83f5a1f128ecf0e03f8d219e3b76c8e6d11f28638fe2b0f0e560cddaf16ecdb616d75afdf52ef15bb9ca3590e2b281b9e2320e2e1304b2d79c2a7726ad28d92127ab76072ad724bd474fb3add51366e85c2225bb2cc2f07dc762fee2f95010f957c6d1cfe71b501b950a8de2815139a5ffc653a410"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x2) 18:52:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x268, &(0x7f0000000440), 0x10d5}, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x400000000000) 18:52:23 executing program 3: r0 = socket$inet6(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206430200a843090626274d040016021500074004004c00007aa3c728f1c46b7b31afdc1338d54400009b84136ef75afb6cde448daa7227c43ab8620000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) [ 400.416928] selinux_nlmsg_perm: 5 callbacks suppressed [ 400.416938] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15061 comm=syz-executor.0 [ 400.446241] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15061 comm=syz-executor.0 [ 400.464641] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15061 comm=syz-executor.0 [ 400.498183] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15061 comm=syz-executor.0 [ 400.529530] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15061 comm=syz-executor.0 [ 400.552152] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15061 comm=syz-executor.0 [ 400.565641] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15061 comm=syz-executor.0 18:52:24 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'tunl0\x00', 0x4fff}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r0, r3, 0x0, 0x800000000024) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) write$P9_RVERSION(r4, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000002340)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 18:52:24 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(0x0, 0x1040, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000280)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f0000000180)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x200b302011ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK/file0\x00', 0x0, 0x0) ioctl$KDGKBENT(r2, 0x4b46, 0x0) [ 400.580320] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15061 comm=syz-executor.0 [ 400.593531] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15061 comm=syz-executor.0 [ 400.606845] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15061 comm=syz-executor.0 18:52:24 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000100)={0x0, 0xfddf, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="010700000000000000000600ffffb49cbabd9d697e9f7b842671fdc53589e99e007bc6e4f81bb1a8dbfdcabe6aa0aad942f3008fd94f090115de71a62fa3bbccec2fa6c349c119843891636aa8edac24fc4e7ef178f406ed3572f1c26d3713a06ee7c5e1365cc45a97de2bf665f9d76008f1dcacf78968e337453b224352729236b8299d323b6229314390daac9dd8b7a2af6dc13291be69c9be2f528c8ccf202c7ec151a38f63441b34b6a4e484f8b942acffacc583955fc351ffffbe898d135d59723ed657765bebfb2e689623dbaed8d00733f04d1e6c34b5df63f8d8e65328656013cf7e7da8c6da"], 0x14}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x7b04e290f1dec202}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c010000", @ANYRES16=r3, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r4 = dup3(0xffffffffffffffff, r0, 0x80000) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r5, 0x80404508, &(0x7f0000000d80)=""/142) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000c40)=[@in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in6={0xa, 0x4e24, 0x123f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x87, @empty, 0x6}], 0x94) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x200, 0x6}}, 0x20) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f00000003c0)=0xe56, 0x4) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x1c, r6, 0x20, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48001}, 0x4000) sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100ae00}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r6, 0x42d7ff081bb61dce, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20080002) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000480)={0x1a, 0x100000, 0x400, 0x0, 0x0, 0x1, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='\x00\xe5\xff\xff\xff\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r7, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 400.694914] device sit0 left promiscuous mode [ 400.706526] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 400.719977] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:52:24 executing program 4: syz_emit_ethernet(0x7ffff, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x21c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff83, 0xa, 0x0, 0x0, 0x0, 0x8906}}}}}, &(0x7f0000000040)) r0 = socket$inet(0x10, 0x2000000000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2f0000001d0005c5ffffff000d0000000200001f01000000000002c9130001000000000050800000d18e1092e0c875", 0x2f}], 0x1}, 0x0) [ 400.780415] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 400.817616] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:52:24 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) r0 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() getpgid(r1) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000240)={0x4}) r2 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0x0, 0x100000005}) r3 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x0, 0x2, 0x0, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x0, 0x6, 0x0, 0x3f, 0x0, 0x3ff, 0x0, 0x4, 0x0, 0x5, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r0, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r4 = getgid() fchownat(0xffffffffffffffff, 0x0, 0x0, r4, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) [ 400.860710] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 18:52:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:26 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0xffffffffffffff3f, 0x0}, 0x24000048) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x28) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/stat\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) prctl$PR_SET_TSC(0x1a, 0x25f7aa0bb1c7b571) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:26 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$nbd(r0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004580)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000004680)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@remote}, &(0x7f0000000200)=0xc) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0'}, 0xb) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r3, 0xc7, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30000}, 0xc, 0x0}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{}, {0x7fffffff}], 0xee01}, 0x18, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 18:52:26 executing program 3: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000100)={0x0, 0xfddf, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="010700000000000000000600ffffb49cbabd9d697e9f7b842671fdc53589e99e007bc6e4f81bb1a8dbfdcabe6aa0aad942f3008fd94f090115de71a62fa3bbccec2fa6c349c119843891636aa8edac24fc4e7ef178f406ed3572f1c26d3713a06ee7c5e1365cc45a97de2bf665f9d76008f1dcacf78968e337453b224352729236b8299d323b6229314390daac9dd8b7a2af6dc13291be69c9be2f528c8ccf202c7ec151a38f63441b34b6a4e484f8b942acffacc583955fc351ffffbe898d135d59723ed657765bebfb2e689623dbaed8d00733f04d1e6c34b5df63f8d8e65328656013cf7e7da8c6da"], 0x14}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x7b04e290f1dec202}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c010000", @ANYRES16=r3, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r4 = dup3(0xffffffffffffffff, r0, 0x80000) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r5, 0x80404508, &(0x7f0000000d80)=""/142) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000c40)=[@in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in6={0xa, 0x4e24, 0x123f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x87, @empty, 0x6}], 0x94) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x200, 0x6}}, 0x20) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f00000003c0)=0xe56, 0x4) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x1c, r6, 0x20, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48001}, 0x4000) sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100ae00}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r6, 0x42d7ff081bb61dce, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20080002) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000480)={0x1a, 0x100000, 0x400, 0x0, 0x0, 0x1, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='\x00\xe5\xff\xff\xff\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r7, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000080)=r3) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) recvfrom$x25(r4, &(0x7f00000002c0)=""/199, 0xc7, 0x0, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 18:52:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="080027bd7000ffdbdf25150000001c000100185f626f6e64000000001400090008000200010000000800010001000000240006000400020008000100e20c0000080001000004000008000100030000000400158531b2070f0200"/104], 0x3}}, 0x40008000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) semget$private(0x0, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000000)) getresuid(0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x4cf, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffd], 0x0, 0x210500}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(r6, 0x6, 0xe, &(0x7f0000000480)="b58b3e9da9beb4ad9d1d39c4", 0xc) 18:52:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:27 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) capset(&(0x7f0000000140)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000180)={0x8001, 0x7fffffff, 0xc7ae, 0xff000000, 0x8, 0x8}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:27 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x401, 0x0) mkdir(0x0, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) vmsplice(r1, &(0x7f0000000100)=[{&(0x7f0000000000)="77bfe72d1100264616ba65397b4e33a7651b2f23abd0431ccedb86b6ca719722c02047afa5152efdd4ac5e23bafb5296c5f74c1dadd12dec809a0a14d08c", 0x3e}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000040)="c83fc5df6bcee11c60789a44b706aeaee84ecce0bf6400bab28b3acbef99f26c99b48c6e8ef41d5e3d072a3a53aeb1ae42c3d61c743e12c55e531dbcfed83c0f10bd5407b990e35740306bc5036dbe383544e0c475460eaf1c672eb1fd437587d681363536be1eb21e963d6f6533b13ba51954e609bf7ee7cafd3b405225febfb1440eef0e36a534acb5", 0x8a}, {&(0x7f00000014c0)="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", 0x1000}], 0x4, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=0x1, 0x2e2) syz_open_dev$usbmon(0x0, 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mbind(&(0x7f00009cf000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x2, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) write$FUSE_INTERRUPT(r2, &(0x7f0000000180)={0x10, 0x0, 0x5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) 18:52:27 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) preadv(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/27, 0x1b}], 0x1, 0x0) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2}}}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x0, 0x40000000, 0x10000101) [ 403.830421] ptrace attach of "/root/syz-executor.4"[15111] was attempted by "/root/syz-executor.4"[15119] [ 403.845432] audit: type=1804 audit(1570387947.339:214): pid=15114 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir894535329/syzkaller.qFUPsg/226/file0" dev="sda1" ino=17473 res=1 18:52:27 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xe}, 0x16) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, 0x0}, 0x18) ioctl$void(r0, 0x5450) 18:52:27 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3fffc000000, 0x100080) sendto$inet(r0, 0x0, 0x216, 0x210007fd, &(0x7f0000000380)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) sendto$inet(r0, &(0x7f0000000540)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x204) [ 403.983857] audit: type=1400 audit(1570387947.359:215): avc: denied { map } for pid=15135 comm="syz-executor.0" path="/dev/usbmon5" dev="devtmpfs" ino=468 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1 18:52:27 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x80801, 0x3) accept4(r1, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) connect$inet6(r2, 0x0, 0x43) accept$nfc_llcp(r2, &(0x7f00000001c0), &(0x7f0000000240)=0x60) socket$caif_seqpacket(0x25, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0xb357cc3084b910fe, 0x0, 0x133) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, 0x0) r6 = dup(r4) ioctl$int_in(r4, 0x5452, &(0x7f0000000580)=0xe2e) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r7, 0x10e, 0xa, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0xff50) io_setup(0x81, &(0x7f0000000340)) io_setup(0x0, 0x0) io_cancel(0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000540)='./bus\x00', 0x141042, 0x100) finit_module(r3, &(0x7f0000000440)='em1procv\x00', 0x1) ftruncate(r8, 0x2007ffc) socket$inet6(0xa, 0x2, 0x0) sendfile(r6, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 18:52:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x42f}) 18:52:27 executing program 3: chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000a00)=[{}, {}]}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000200)=0xfffffffc, 0x4) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000005c0)) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x4000, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, &(0x7f0000000b40)) pivot_root(&(0x7f0000000340)='./file2\x00', 0x0) mount$9p_virtio(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000500)='./file1/file0\x00', &(0x7f0000000600)='9p\x00', 0x1, &(0x7f0000000940)={'trans=virtio,', {[{@privport='privport'}, {@access_user='access=user'}, {@version_u='version=9p2000.u'}, {@access_client='access=client'}], [{@context={'context', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@seclabel='seclabel'}, {@appraise_type='appraise_type=imasig'}, {@dont_appraise='dont_appraise'}, {@appraise_type='appraise_type=imasig'}]}}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x6, 0x200) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$sock_proto_private(r3, 0x89e1, &(0x7f0000000280)="a56fa1244fcefee0f7af4dd9c43cec2a35d31667892d23d0d6d4c2c13fc59dfa9976ecc121ca") ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000800)={0x0, &(0x7f00000007c0)}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000840)) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000d80)={0xff9ffff, 0x0, 0x0, [], &(0x7f0000000d00)={0xa30001, 0xfffffffe, [], @p_u16=&(0x7f0000000c80)}}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000680)) socket$caif_stream(0x25, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f00000003c0)=""/115, 0x73}}, {{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000840)=""/217, 0xd9}, {&(0x7f0000000a40)=""/148, 0x94}], 0x2}}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000000b80)=""/47, 0x2f}, {&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/90, 0x5a}, {&(0x7f0000000cc0)=""/38, 0x26}], 0x4, &(0x7f0000002e00)=""/178, 0xb2}, 0x3}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {0x0}, {&(0x7f0000003040)=""/30, 0x1e}, {0x0}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x6}}, {{0x0, 0x0, 0x0}, 0xfffffffffffffffd}, {{0x0, 0x0, &(0x7f0000007040)=[{0x0}, {&(0x7f0000006f40)=""/255, 0xff}], 0x2, &(0x7f0000007080)=""/57, 0x39}}, {{&(0x7f00000070c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000007500)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x4}, {{0x0, 0x0, 0x0}, 0x2}], 0x8, 0x1, &(0x7f0000008b40)) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:52:27 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000001c0)=0xfffff8e9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000100)=""/39, &(0x7f0000000140)=0x27) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000300)) socketpair(0x1, 0x2, 0x9a, &(0x7f0000000740)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000180)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000), 0xc, 0x0}, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x4) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$midi(0x0, 0x200, 0x1) getrandom(&(0x7f0000000280)=""/113, 0x71, 0x3) openat$sequencer(0xffffffffffffff9c, 0x0, 0x440903, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5c9, 0x4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) semget(0x3, 0x2, 0x20) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) ioctl$DRM_IOCTL_AGP_ENABLE(r4, 0x40086432, &(0x7f0000000100)=0x6) r5 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x108b, &(0x7f0000000100)}], 0x492492492492805, 0x8000) 18:52:27 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, &(0x7f0000000300)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, 0x0, &(0x7f0000000340)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r3}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40101000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000002a00140529bd7000fcdbdf2500000000", @ANYRES32=r3, @ANYBLOB="0f000e000105000009000200"], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20180) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) setsockopt$TIPC_MCAST_REPLICAST(r4, 0x10f, 0x86) getdents(r5, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 404.445954] overlayfs: failed to resolve './file1': -2 18:52:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:30 executing program 2: chdir(0x0) socket(0x10, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7f, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB='0\x00'/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffffff00000000080001006362710004000200"], 0x30}}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x80000, 0x0) 18:52:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x806}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f00000000c0)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x00\x00\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd@\x00\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891c, &(0x7f0000000580)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00#\x06\x00\x00\x00\x00\x00\x00\x00D3A}\xe4\xac\xff\x82q\xc7J\xe2J\x06\x00\x00\x00\x00\xd9\xbc\x0e\x9a\xd5\t\f\xe2\x90G903\xd7\x8d\xa8\x9e@?\xe5\xb1\rQ-\v\xcb\xbf\xd6\\\bWN\x824\x06\xe9fL\x9b>\xdd\a\xba8\x1a{\x93\xbb\x02*5F\x8d*\xbb\xd9|\x03\x86&Ds\xd1`=\x04\'\xf7\xd7\xb3\xae3\x81\xdd\xf57\xd9Y=\xb6/\xe2g\xc7\xcd\x1d\xb3T9\xda\xc3\x80\xd4\x13\x9f\xbf\xc0\x82\xe2\xc7\xc8\x18w\xc163B\xdcW\xff\xaf\x00\x00\x00\x00J\x00*\x14\b\xeb\xc4\x8d\xb7\x81h/\x9d\xcf\x8cJ\xec\b\xdd&\xc7`\x86\xe5\xaf\xdeC\xcd\x9e\x01\xd4\x9b\x9b)\xf9=\xed\x15!+\xc4>V\x19!V\xaajPP\x00\xfa$Q\x82\x007Qu.\x9bm\xf9\x8ctEI\x94\xbf\xd9\xe4l\x1a&\x1ae\x02p\xd6J\xe5},V\xe9]\x96\xbc\r\x8a\xa5G\x84*\xdd\x14\xdc\xef\xc9\xber\xac;\xd2]\xd8\x9f\x96\xc5\x00\x00~\xb4\xd8LS\x8e\x84\x88\a\x92\xe1\xac\xf7\xd5\xe8\x84h\xf4v\x86\xe7+\xba\xe3F\x02 gEo\xf5M\x1c\xc9\xb3@\xd0}S\v\"G\xf8\x9f\x82(iuW{+\xef\x9cD\x9d9\xf6\xdf/.\xcep;\x04 \xe3r\x91\xbc\x17)\x1f') r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000000)={0x34}, 0x4) 18:52:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x1b, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000004c271a000000000000950000000000000013000000000000000000e5da83a6e258f2f6c867d59ce740ef73abf459cdc013640f99e57d44acd4785a8e1f03b2531de741c1d2561487b0385865d55aeb88ff25786057c3976036e61681bed3271dff440e131aa4cd3852e3daa41d09f261c4d9d921b953bf7092f24b801228d1e1522880b7af29fce7b30ac285f3a78208ac6b27e54f8d026e30b3a3ae5d6ddce29dd477452b5b46e457645b437105b25af9a22f1e0f7eb47285ad9d03d1b03685caf6776c5e2d68dff99ae03630ac2dba6480cfbc9b27"], &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffe}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x8, {{0x100000000, 0x3, 0x2}}}, 0x28) 18:52:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @loopback}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040), 0x52d) close(0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x10, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2}}}, 0xffffffffffffff52) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000000040)=0x90) 18:52:30 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)={0x3, 0x0, [{0x2, 0x0, 0x2, 0x0, 0x9}, {0x2, 0x3, 0xffffffff, 0x9, 0x80000001}, {0x80000008, 0xb4, 0x400, 0x1ff, 0x4}]}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6c5", 0x4) sendmmsg$alg(r1, &(0x7f000000bec0)=[{0x0, 0x0, 0x0, 0xfffffffffffffeef, 0x0, 0x0, 0x40}], 0x4924924924927eb, 0x4000) recvfrom$unix(r1, &(0x7f00000000c0)=""/246, 0xf6, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) accept4$tipc(r5, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10, 0x800) r6 = fcntl$dupfd(r4, 0x0, r3) r7 = socket$alg(0x26, 0x5, 0x0) getsockopt$bt_hci(r7, 0x0, 0x2, &(0x7f00000002c0)=""/202, &(0x7f00000001c0)=0xca) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000000040), 0x0, &(0x7f0000000e40), 0xfffffffffffffcb6}], 0x0, 0x0) 18:52:30 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 406.741108] selinux_nlmsg_perm: 5 callbacks suppressed [ 406.741117] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15197 comm=syz-executor.2 18:52:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x404400, 0x0) r3 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000200)={{0x1, 0x0, 0x10ca, 0xd04, 'syz1\x00', 0xfff}, 0x4, 0x30, 0x3, r3, 0x5, 0x8, 'syz1\x00', &(0x7f00000000c0)=['syz_tun\x00', 'syz_tun\x00', '\x00', '\x00', 'syz_tun\x00'], 0x1a, [], [0x9, 0x5788, 0x5, 0x6]}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000340)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_newaddr={0x34, 0x14, 0xd0b, 0x0, 0x0, {0xa, 0x40, 0x7, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x10c}]}, 0xffffffffffffff9f}}, 0x0) 18:52:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xfffffffffffffcaa, 0x2, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x1c704597e91a00dd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="0cd7509dc0da0600000000000000e80a740c4b3875feecfbe7a7eb8213385a78f033e1dd06d972eba2cf31b3616bee1e3b386bff14777b4c773c3cc49ea1e10f6cff16bfd94ad95b9d92e1d04b87727192e48a1dea3e7d"]) bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 406.871078] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15209 comm=syz-executor.2 18:52:30 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0xcd) accept$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10) r1 = getpid() sched_setattr(r1, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30}, 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r3, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="2321522fb3214d0f0df81f47442a33015d8cecf49f20151a02d3340f"], 0x1c) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r5, 0x4004551e, &(0x7f0000000040)=0x8000) write$binfmt_script(r4, &(0x7f0000000540)=ANY=[@ANYBLOB='@'], 0x1) write$binfmt_script(r4, &(0x7f0000000380)={'#! ', './file0'}, 0x34000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, 0x0, 0x0) [ 407.030213] protocol 88fb is buggy, dev hsr_slave_0 [ 407.035477] protocol 88fb is buggy, dev hsr_slave_1 18:52:30 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000100)={0xffffffffffffffff, r3, 0x40, 0x1000, &(0x7f0000000780)="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", 0x20, 0x20, 0x1, 0x1bca, 0xfffc, 0x1, 0xfffffffc, 'syz1\x00'}) [ 407.586391] audit: type=1804 audit(1570387951.079:216): pid=15246 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name=2F726F6F742F73797A6B616C6C65722D746573746469723839343533353332392F73797A6B616C6C65722E7146555073672F3232392F7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16818 res=1 18:52:33 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x80101, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000140)=0x3) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:33 executing program 3: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) move_pages(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000ff6000/0x7000)=nil], &(0x7f0000000040)=[0x8, 0x9, 0x1], &(0x7f0000000080)=[0x0, 0x0], 0x2) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = dup3(r0, r1, 0x0) ioctl$KVM_SET_SREGS(r5, 0xc008ae91, &(0x7f0000000140)) dup2(r6, r5) 18:52:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004c00)=[{{0x0, 0xfffffffffffffe15, &(0x7f00000014c0)=[{&(0x7f0000001140)="638c0136987592969eaf1f328a9276178b0a29f74c33265da6624ec984ca4a6a679c2b93d056e8b4536793249004e42708373999209a", 0xfffffffffffffe26}], 0x1, 0x0, 0x106}}], 0x1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x1, {{0x44}, 0xc4}}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) syz_open_dev$adsp(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x9) sendto$isdn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00\xa6\xfbS\xf4\xa9\n\x82-\x7fps\x17I\xbb\x80\xfax\xb2K//\x19\xc0\xfe+k\x0f:\xde-\x98X\xa2\x96A\x15/G\xf2(\x92\xa2\xe2:w', 0x1a2) shutdown(r4, 0x1) r7 = accept4(r3, 0x0, 0x0, 0x0) sendto$inet6(r7, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r8, 0x0, 0x0) lseek(r8, 0xfffffffffffffffe, 0x1) ioctl$FICLONE(r8, 0x40049409, 0xffffffffffffffff) 18:52:33 executing program 2: getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000440)) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 409.802449] f2fs_msg: 6 callbacks suppressed [ 409.802481] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 409.806288] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 409.826227] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 409.853724] attempt to access beyond end of device [ 409.869546] loop2: rw=12288, want=8200, limit=20 [ 409.892752] F2FS-fs (loop2): invalid crc value 18:52:33 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xc8800, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_open_dev$video4linux(&(0x7f0000000300)='/dev/v4l-subdev#\x00', 0x20, 0x2480) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 409.910707] attempt to access beyond end of device [ 409.944629] loop2: rw=12288, want=12296, limit=20 18:52:33 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x6, 0x7, 0x101}) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_dev$video(0x0, 0x0, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x40a400) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x80045519, &(0x7f0000000040)=0x6) [ 409.967935] F2FS-fs (loop2): invalid crc value 18:52:33 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0xfffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x183) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 410.009893] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 410.040728] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 410.083781] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 410.129208] attempt to access beyond end of device 18:52:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001780)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x5, 0x0) shutdown(r1, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@hopopts={0x73, 0x0, [], [@padn={0x1, 0x2, [0x0, 0x0]}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r1, 0x100000000000012) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac1414e0}]}, &(0x7f0000000080)=0x10) [ 410.153197] loop2: rw=12288, want=8200, limit=20 [ 410.188521] F2FS-fs (loop2): invalid crc value 18:52:33 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000140)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:33 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x226, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7ff) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}], 0x1, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0) write$P9_RVERSION(r2, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x15) write$P9_RAUTH(r2, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r2, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno', @ANYRESHEX=r2]) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) connect$packet(r0, &(0x7f0000000380)={0x11, 0x1b05a8b6b9515868, r6, 0x1, 0x4d, 0x6, @dev={[], 0xb}}, 0x14) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r7, 0x0, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000007f000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac69fa6575d5cec2bbdf9f29fa13b79090e3ce02e1349234fd043e00ca79f183769d965164d9b2d97e096f9ae1985639b537e7711059f028a7e154f3ec99901032ed9a97305ee4c3089897f18ecbb9dcab1654e9d81d604b930d0a0f9891f1a10395f8814aa9a7a9ae6c2200716955259768ddb37e7733886abb056f01a3a94f258eb6d7de29021cd11ae95deb48af1216cb35fb9e00583105b6b172abc9c1cf72f836e1a353eda179010915b46293ecc7f6d47f574451930dd33208fd167266ddfd4002e962eb552ec3547a8b4b938ffe703768f5"], 0x110) setsockopt$inet_group_source_req(r7, 0x0, 0x2c, &(0x7f0000000080)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000340)={0xfffffffc, 0x1f, 0x9d02, 0xfffffff7, 0xfffffff7, 0x5}) ioctl(r7, 0x8, &(0x7f0000000300)="1e3471031188e02f2362d9d02310ee4d024f4c008470b67f64cd5ae0809db5b8524eac950959b26f2efc50986c7872df61e94a0bf87f27292d997aacc096") ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000280)='veth0_to_bond\x00') request_key(&(0x7f0000000400)='trusted\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)='\x00', 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000001c0), &(0x7f00000002c0)=0x8) umount2(&(0x7f0000000140)='./file0\x00', 0xb) openat$hwrng(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x2174) r8 = semget(0x3, 0x2, 0x0) semctl$SETVAL(r8, 0x2, 0x10, &(0x7f00000000c0)=0x1) link(0x0, &(0x7f0000000240)='./file0\x00') [ 410.209502] attempt to access beyond end of device [ 410.226090] loop2: rw=12288, want=12296, limit=20 [ 410.237520] F2FS-fs (loop2): invalid crc value [ 410.267284] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 410.326427] Unknown ioctl 35105 [ 410.331178] 9pnet: Insufficient options for proto=fd [ 410.342613] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 410.388087] attempt to access beyond end of device [ 410.393648] loop2: rw=12288, want=8200, limit=20 [ 410.398506] attempt to access beyond end of device 18:52:33 executing program 3: perf_event_open(&(0x7f0000001480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x44, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='G\x87\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x1}, 0x10}, 0x70) exit(0x0) [ 410.430334] loop2: rw=12288, want=12296, limit=20 [ 410.448964] attempt to access beyond end of device [ 410.454650] loop2: rw=12288, want=8200, limit=20 [ 410.459635] attempt to access beyond end of device [ 410.464718] loop2: rw=12288, want=12296, limit=20 [ 410.514664] 9pnet: Insufficient options for proto=fd [ 410.523155] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 410.610648] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:52:36 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, &(0x7f0000000140)) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x30004, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) mlockall(0x6) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000300)=0x4, &(0x7f0000000340)=0x4) lseek(r4, 0xfffffffffffffffe, 0x1) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x4}) mknodat(r4, &(0x7f0000000100)='./file0\x00', 0x7e01, 0xfffffff8) recvfrom$packet(r0, &(0x7f0000000380)=""/197, 0xc5, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:36 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80800, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000080)={0x6, 0x9, {0x55, 0x1ff, 0x1, {0x8000, 0x4}, {0x100, 0xd7}, @cond=[{0x1, 0x9, 0x1ff, 0x58, 0x34, 0xf}, {0x6, 0x3d2a, 0x5, 0x1, 0x5, 0x1}]}, {0xf7, 0x800, 0x0, {0x1, 0x7ff}, {0x8, 0x8000}, @rumble={0x1, 0x4}}}) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f00000005c0), 0x400000000000189, 0x0, 0x0) 18:52:36 executing program 2: syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) 18:52:36 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x226, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7ff) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}], 0x1, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0) write$P9_RVERSION(r2, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x15) write$P9_RAUTH(r2, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r2, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno', @ANYRESHEX=r2]) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) connect$packet(r0, &(0x7f0000000380)={0x11, 0x1b05a8b6b9515868, r6, 0x1, 0x4d, 0x6, @dev={[], 0xb}}, 0x14) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r7, 0x0, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000007f000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac69fa6575d5cec2bbdf9f29fa13b79090e3ce02e1349234fd043e00ca79f183769d965164d9b2d97e096f9ae1985639b537e7711059f028a7e154f3ec99901032ed9a97305ee4c3089897f18ecbb9dcab1654e9d81d604b930d0a0f9891f1a10395f8814aa9a7a9ae6c2200716955259768ddb37e7733886abb056f01a3a94f258eb6d7de29021cd11ae95deb48af1216cb35fb9e00583105b6b172abc9c1cf72f836e1a353eda179010915b46293ecc7f6d47f574451930dd33208fd167266ddfd4002e962eb552ec3547a8b4b938ffe703768f5"], 0x110) setsockopt$inet_group_source_req(r7, 0x0, 0x2c, &(0x7f0000000080)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000340)={0xfffffffc, 0x1f, 0x9d02, 0xfffffff7, 0xfffffff7, 0x5}) ioctl(r7, 0x8, &(0x7f0000000300)="1e3471031188e02f2362d9d02310ee4d024f4c008470b67f64cd5ae0809db5b8524eac950959b26f2efc50986c7872df61e94a0bf87f27292d997aacc096") ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000280)='veth0_to_bond\x00') request_key(&(0x7f0000000400)='trusted\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)='\x00', 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000001c0), &(0x7f00000002c0)=0x8) umount2(&(0x7f0000000140)='./file0\x00', 0xb) openat$hwrng(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x2174) r8 = semget(0x3, 0x2, 0x0) semctl$SETVAL(r8, 0x2, 0x10, &(0x7f00000000c0)=0x1) link(0x0, &(0x7f0000000240)='./file0\x00') 18:52:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x140, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) write$P9_RFLUSH(r0, &(0x7f0000000200)={0x7, 0x6d, 0x1}, 0x7) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000100)={0xfffffffe, 0x100, 0x61, &(0x7f0000000080)="1afd49150ebb4374cb4fd5d12aab71a204b2c0d9b12435d707f272f0047ed897c7281161385f8ad81e9ef987f8ce66a33bb363f0d2e9063fbb4f6b202074de997e934ff2df65833a8506112a4be2f44f59e8eaa4c0419eab91cc6a2c5249c6fb39"}) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 18:52:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 412.809621] QAT: Invalid ioctl [ 412.854848] 9pnet: Insufficient options for proto=fd [ 412.883362] Unknown ioctl -1072655865 [ 412.893999] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 412.980304] Unknown ioctl -1072655865 18:52:36 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = open(&(0x7f0000000180)='./file0\x00', 0x200, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x7) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:36 executing program 4: gettid() msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000580)=""/108, 0x6c}], 0x2) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)='./file1/file0\x00') close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000280)={0xe, 0x6, 0x1f, 0x0, 0x12, "8eb5935c2940fd1ba4871d1031b533e02848"}, 0x1e) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) link(&(0x7f00000001c0)='./file1/file0\x00', &(0x7f0000000240)='./file2\x00') lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file1/file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x2000, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="6d657461636f70793d6f6e2c696e646578396f66662c64656661756c745f7065726d697333a356713d2773696f6e732c6e66735f6558706f72743d6f66662c6e4a735f6578706f72743d6f66662c704a72a34a855bae04168b806d69745f646972586374696f2c6f626a6f7c515fe97c019a5f757365733d2f6465762f6c6f6f"]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffe30, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x297) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e23, 0xfffffffd, @ipv4={[], [], @broadcast}, 0x7fff}, r2}}, 0x38) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) sendto$isdn(0xffffffffffffffff, &(0x7f0000000880)={0x1, 0x0, "dd8198f8cd3de958a6283bae3adeaba1146b5d5dc6607c45f330b64c96816236f29cc057866579d5a174f47446af9d4abed93da1ad4c1cdfb6579b28a13987d5dbb98439041acf05541e2d3083d9dfd653eed581a63dc13441adc03c8bfb5ea13c5a9d69fc9d1b7bc26f1bf69a0a551dfb2c724445423430614c4f9d76cbf8a1b4034cb4778ab5db0fd5a1fe2d4c6ceebf97704a9340b48938dce520a3c0f6f7a0b30276236f03c043f58ee51da4d72f18e579ae8f82675c38a23893147656505cca5d863a0fa74ac7"}, 0xd1, 0x0, &(0x7f0000000980)={0x22, 0x0, 0x7, 0x1f, 0x5}, 0x6) openat(0xffffffffffffffff, &(0x7f00000006c0)='./file2\x00', 0x80000, 0x2) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x38d00c92cff06ac5, &(0x7f0000000140)=""/170, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r3, 0x5386, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x10) 18:52:36 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'teql0\x00', 0x8000}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x800, 0x1, 0x9, 0x4, 0x8}, &(0x7f0000000140)=0x14) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) syz_open_procfs(r2, &(0x7f00000001c0)='net/dev_mcast\x00') ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = dup3(r2, r1, 0x0) accept4$alg(r3, 0x0, 0x0, 0x100400) [ 413.381588] overlayfs: unrecognized mount option "metacopy=on" or missing value 18:52:36 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000240)='ns@') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:37 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 413.554999] audit: type=1400 audit(1570387957.049:217): avc: denied { map } for pid=15370 comm="syz-executor.3" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=59768 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 413.593477] overlayfs: filesystem on './file0' not supported as upperdir [ 413.609817] QAT: Invalid ioctl 18:52:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:39 executing program 3: memfd_create(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000480)='/dev/adsp#\x00', 0x1, 0x20100) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') getrlimit(0x5, &(0x7f0000000300)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x800fe) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x78e0411d4cb2391, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x80, 0x0) fallocate(0xffffffffffffffff, 0x28, 0x6, 0xfff) sync() r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) read$eventfd(r3, &(0x7f00000003c0), 0x8) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f00000004c0)=""/207) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) write$P9_RLCREATE(r0, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x0, 0x4, 0x5}, 0x3}}, 0x18) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f0000000200)={0x9, 0x40, 0x200, 0x5, 0x9, 0x5, 0xed96}, &(0x7f0000000280)={0x5, 0x5, 0x0, 0x7fff, 0x0, 0x9, 0x0, 0xfffffffffffffff5}, &(0x7f0000000340)={0x3ff, 0x7fffffff, 0x9, 0x7, 0xf87, 0x66, 0x0, 0x28e}, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={0x7}, 0x8}) 18:52:39 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) fcntl$getflags(r0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000200)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x34, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0xd, 0x2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0xeb94}, @md5sig={0x13, 0x12, "e7b607b04bf357d2762136ab4f236218"}, @sack={0x5, 0x2}]}}}}}}}}, 0x0) 18:52:39 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000ac0)=ANY=[], 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x800000) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000000)=""/94) ioctl$SIOCRSGL2CALL(r0, 0x89e5, 0x0) r2 = add_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, r2, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, &(0x7f00000036c0)='trusted.overlay.nlink\x00', &(0x7f0000003700)={'U+', 0x401}, 0x28, 0x1) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000180)={0x30, 0x31, 0x2, 0x1c, 0x1, 0x40, 0x6, 0x8a, 0xffffffffffffffff}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x2, 0x803, 0xff) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r0, 0x0, 0x72439a6b) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x8d, 0x4) [ 415.837851] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 18:52:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:39 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 415.874537] audit: type=1400 audit(1570387959.369:218): avc: denied { map } for pid=15395 comm="syz-executor.0" path="/dev/audio" dev="devtmpfs" ino=679 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 415.912109] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 415.971015] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.978774] bridge0: port 1(bridge_slave_0) entered disabled state 18:52:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000002c0)}, 0x4000) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xffffff7f) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) pipe(0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000000)=0x81) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) prctl$PR_SET_TIMERSLACK(0x1d, 0x9) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080), 0x10) [ 416.021894] syz-executor.4 (15396) used greatest stack depth: 23264 bytes left 18:52:39 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x54e3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x3, 0x80000000000000d5, [0x0]}, 0x2de) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000000c0)) 18:52:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000640), 0x1000) unshare(0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x77db}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000040)={0x0, 0x3000, 0x0, 0x8}) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f00000004c0)={0x2, 0x80, 0x4}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)}, 0x0) [ 416.247487] Unknown ioctl 21513 [ 416.303534] Unknown ioctl 21513 18:52:39 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/143) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) [ 416.440677] bond0: Releasing backup interface bond_slave_1 [ 416.577906] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 416.612866] bond0: Error: Device is in use and cannot be enslaved [ 416.640877] bond0: Releasing backup interface bond_slave_1 18:52:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:52:42 executing program 3: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x54e3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:42 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) lseek(r2, 0xfffffffffffffffe, 0x1) r3 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_SET_FPU(r3, 0x41a0ae8d, &(0x7f0000000440)={[], 0x5, 0x6, 0x21, 0x0, 0x8cee, 0x5002, 0x0, [], 0x400}) write$FUSE_DIRENT(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x108) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) setsockopt$inet_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000780)="11a8e79527870d82a5b830237598e998d76b1d09c0f21bd985912f20d272b81362e4a0a5839933755b75c75d7eb170aca846442f501b1e8789696019fd1b7aa126de3d26cb34cfcd5fe41d0958bb4864ce4b911f410ceedbcd300f80c7bfb0988a1bb2c5ee876759f0efc88281256301bd5653036c2837adb65281535728495554b71ce2312ec6cef9b79f939b798a009328622dfdf6ebbdc961ec500dabeddd569f472fc07a3eed0b8abe4bd82279f2bedd6d3b5a05cd8ebf695c61540182237dd2054b1ff984668c494f602f5bff43a6280f46d4359a0c349360e5c334fa371b293b6d59beeb483faf55fdcce0ec473a9a0bc5fc22511ff1c9990495a64b2249b269d092ed2161b48b4906186425be3a36eaacd7e649b10705ed0538b4c7df3faf050789e16bb768b489d597526d21d4151a42c32571179f34e79ad34af3257225d999d7fa1b61c0251ce2943a80f0067983797c226214e2ee63d8c1b7cf8232eb80be9ea714c4e752a80034113717d34b9a95a53e9c8b78e10bf8717af41619eaaec896a3c5763b38f86fba1c2e76368ba849a04f3a7ce72c85c6036665ce6bd4219a71b72b925adb1cbaf3857ccce05e89fb86e1d23ebdb61ed59ee09f4a387764a1ce4b82dc271262b85d1ed284f32141ab61070ae1ef569d9f0c153594764166500914a6d0098817735591ea2c457b78248231663965ff87a104c23a7662fad3d29d889062de959150bb4713ef611ea896f2a034fa37ba16b255f92d41947fe38cbb58ad664b523d00492f5bfad9b42d0c6eb21c2f216b0969483f2a06c976535ae872eb064cfc8ec54d71d7ac2430a6e02bc2f9b6b8285cad76dfbb9299ed0eaa0089a408cd1312d871aa50a7ee50f441b0ba819a5517727b72ed259afc73f01d2fd8b4f8003f3e8aaae2269c5c5d1affe4b42b4ee09c51f68a34be555574b2737e701d9a600435dd814bca341afdf363a65f92f9c3695be479a31d06e792237882ed3bc22e85399ffa01e15ca18b7bd0ca06f8382ea965b9e1a673263b0f0472d928d504998eea38189716c9bcd96f6346f4d27031f5d9251e436f41cb8dab399ec11e71c3244b5fc47eb5f853d0352dd86b1750cb3bf6e6523d6b91c2666ac7907606c044861b460d543cd369a4c6b8c15564e1f9ab38013543677724142287ca59fa5bde7669d549358664a0d53b507c3991dcd0e500236c9894205e8e0138ce4c23ae41022f75129c9df6c8849ae6904a3bac0ebb194a8c38898f56f3587e221b71e94edeed09cddf0ef9b017b6b443a0ef542ce8da12d49e0799c136f7f2f90015eb73fc7ee5300a25c4ced8ee2e96e0840088c4ddf69551cefd1f9abb920bbb237a4b6b6a90f6b1bbf1518228c9b71e79b3a33a7eaa1aee18fa474f5411748f7c337027181fd6101daab1e459a5c214a4bd301e55ed9e7e65829dde73e01a72872c4b4eafccaa9a0f4fa05588321b7000dc28e1f9e94063c8ee70b77103785a473f632ef4530424c15fb20311cccf9a58f617e126275c43e9b315cff4cfcd68266d6a111f8e921f6fadf39d39a5b83192605b65186d9883abe95e73a7d9d80d9b6f716236bc6b8088f63e0724f3d803475a6858b4846e3fdd3276ac10553e3eb086fe4bbb627ae833634484ffc6313e4b935557473549f7e6d86f04719e262ea73c50bbae2784ab4a2cca671622b4f3b6ce14d0a9f4c4eb9dbfb2dd83eeb83ae851139a9c4ea1e5f8bc4d14db6b4c8c557891bde6dd7e1b4cb86442a057a26c1679f3e2c4298d408a7458624e39c69fde5ccfc21da2549465731f6358d715dfae05c265fcd73969b37f7f90421a3fad6b4a96a6332970c8a1f7e2c4ce0a2056332e616281f4eb22c06a7aeb873b09719376e8c8e7d5fa784afd6fb676ebf4a49ef185011a3fbe720ca68c84333bc49fd8576243363ed102613b3a9ed6d866d7a25684a6c5dcec4e7cffb993a07f45f05e67ab684988f9d7114a5da9ceb46adfc38be1839ec2d9aa1347d63c65d2aba21faa32374df0a5e15f5778660bca1f2b9a2909bf2d916bd05b86adaa54eed8b80b782251de1ac018cca9bacba0e56fd7a1f7d14445bc9062e266434dc31439f3e6f60d2de529862b744fb0a593fe87be76a4577fc7b4bd8d15fccf1bf6e3f891c04262cef499c794da4caa4f54483adc8b51594da74dad7959344c0d92eeb89adf37c99f5c91280767d3193b224ed66328b6b6003729db2cb9f37a0b8d8528990ad669df0d9be2031d08b9cffdfccb86a5049e01e8bde61823fbe1c85b38009962ce10daefb9be24f4a98500644dad4bcc23a61210e1d8e1520290c3d0f24867b3cb387e900640b43cedb72a9719da8c2fc1959fbb4dacbb36c34e6f759d4ec2d5db6d08abfb05c35d2817cb0c323ad10f89bb51c5e010158e52f4b10cc4fbb28cf68f212cc51416b9baf955842dfb74277ddb580d4a9a490f0bb0debe79e8b6320a4f86c8b3fc6e95581254a30152e979e542c8905f12b98eb8d3b06cc43cd251ccfb9fb411aca365840041b91d129fce11fe10f6784511c1a4b4c171093bf0aba02202426c394a380c11cffc4a28a1ecf3d266edfd7720c3b5e8f5a66fda2cdbba749dddb54527e41e351a6230f13f13feb82e099adc6d78756b0808c39ba9e375c6bba43d524c8b435f399f7117ae9f24330cb1282371a37439c71aa4fb199662cad93c81a97ad934c65fcdf1487b96152dba737b28011fb7d93f66a18b6d03188a7d75b6c6f7b8a57ac45b6942ecb45add87486a6d1169e9ac4a06d0d2132972ccf28f96e27250c9f1cb89729b9e08119d55fe19149115734d9ad5c91d5adcd2e524e10721ab946cb47e932958ac42148dee48a25d0fb56b9478264ea37193ab1c8fb936417211061fdf7a8bf0d7fc5b8b28301fe10729132f552f92d51d18f063dd2ab79111ba7b6f54a7e1e0dde87ce467bfd2cf1bb07c59d4e3353d0f97f921b7907429ec70745b7bf32e2d51d033393c529a425a24b4392cfd5bc2b28275ccacc7d02fb7ba22c5bf5043a027fb3cc36d0951b6ab80d750f127580bf7e668c38f9eda2f8a44bdaf5b15f10723cf4d63010317ad626e533f54e5f68a5352fff53a56557e4609d886d63b31273072a119733b5bceeaf39a6dd5fc5b02a4bbc435cc41068e62baeee91198b41c9e36cf85ddd368773474e08cc2bed2da4f6a418f2d5b3fce507ecd9de5b4b0564d1b7172a0728ec2576fe2db291ce2eb2e87b01c38e94e65bb38cd37a1ab6120b3fb4ffde26fc94bd0c505b82ba4763e7dcd8b7db8ee45369bc22368b3822b06fd9af3497127c501a01d6a5a2ece8f9813e73802ad1bbb406473c3d0fdd5351fb7f5dac1b116a22eb7a54324c74030007f1eccd2ee4dfe3da7de25f6f34a0ffb90c48086c3240de2f05b6ee437c88c334bc71d3f05da429cefb791a74d3c50f9f7ebb8cfb18d16faf33f2cb256cbf01de3de44ea41b6483f9281a36da284d7369e510a2efed533c3f6bc75e08f9ad7db0ba5385dbdb08da7592d52d30d46140aa1c8efd1e6f4647731d7f4b604b693cdb30100a9c15e7ce350693b405ab3064e706497fb02a88440ed07570c04863f1d5965a6efe75739857bfde9a736925ecea089643865a35760cea4e5173e717d744a26c7418d78523b9b99b6d1419e4015478e6ae17cd102d64c0e0fbe3e7da085e2d07f172a784971950dd1e9ed57263cdb2875264b4f79cbf6d0083bf74c79a7b262116a7be757143fbec4239f523108fcdaaaf5020d2f0667bb0e7a25851f2c1380275db07bb51f9c6ccac38b18a96a1bc7ac85fed7a95d4d6b11668b83796090f00d6f5f26b6026a679aa8a684f842ee1617813cdcf8a26346bad06afe4689b8141eb6f5ce04ea7d19813431d23afed64768a6660f673828317e44fb65520cf00a8c7f70c024eebcef8650cbf5beb79d006501acd90bdf51a4a98f25513e5aa06f59d2515827cb4ac58e2e4736ae7090fb7e192a42252379156abfa49295038a64be31796b31ba1bbd8ef6aff28e1cab1aaba515f5f086b07b26798f14788f7f881e983dbb9f535419acf572eed3eda15442208ab83ba1e078e8fb06cf4355c48b45ad109ab53403c307a9e6596c2da20260f3da443227d94576f0c81591aed6885862e34744cac88b24c1fd518c1cc707c99885767c563c07c6f9911bb0bd5153ca59a0ba180dd1103c0e3bc0a230556bb2be8601556ea7ae8c61e9d6857860bae905ce3b1aa081883dae1a7af9d74e389ae1db03b0f445ecfeb8fdbe0586c6f4866e80a8ab57efb9d8cb804c5e49f8a9d93e0c86bb182ee9a1dc1bbc13a196e1eba6b8f4199e60f5114c14fc87dcabaa9d58a7841c1e87bfa61dc81e11b915c8583cc9b7ea7e50cce87805b99c36cc7936a526dee363910f7393ad43bf411eacc36d0392d941efebbb812c9662e8f417832141c1fc8c5bac25b07bb10c2d5247442977c33eb69eca201f8d659ee3de29c3aa5068fa83d9e8db451b64ceb7536a44ed6c2c80cdc18f17b88e082bd83c4169d434e61e90d8d849623e9dd76fed471ef411cee811630ef1b450b8578ce5c67a16a919850fddda4c335ab568559366d62ea6de15952c6bd22bb41ade82530aafeb13fe41815b8f0362333aa70d5775964b5c91224d6010af89d1a728214d727985452a06f8c3001f634efaacef3a05193864c3882680c891476113fe01b8ae622882b1977ce41bc67c4a5b8540f0c9619326ab6e993808f4d8ef031ce8017e6ebe4b31f012b0cf10e4dd57c68d4159f8a6664bcd9f52185f3f896bfb5d4283ae6f470f712ae5997ae1d36af002584ee9d579688c4752e9da6ce72a219c28d1606e6c9ce6b7cb0989c4b2236828479c5a3d158222154167df8b38a98179d1ff0f59e35db33049e809a7cc0798ab605ad9a790d43a73a985cdbb51128a78c32f68a8ad4c70c98a4c09f784930d1c172a748bb05e4d89d3e584338cc7e20b57f45ab072d906efdba35c9a4145c9b40aab6d933357c8090c7f5100b4c0576e14210e1bc1d9e85e55270941a58264797518cc193f5e38d809ff0f5b24f02b015bedc49f3ab9312fd50c2a7a1ee68c5ebca1b431639c51190521c9e0f64432d4788aab3d96d7a0b48636c1f296f489e3dc87ecef67f788dfcc889a91303ca1be361a97042c2263fb88f3f57afc9c0d913e2d29666460add21ff7e58fdd5a479cadf6a6915a96871406f906a38bf9e43765810e2a26561b3783b4818f7e4f5a35a27e41811cf9e5b424b5fb8ccff7eb9f25946c12ecbc9ea31b0569353e2ef08dc2e47c1a688c61951fce35496d5d3fddbf0758df6beb030e93aa6c975c2277eb45dbd5c5f3aae22771ae2a9f975b7e35759ce1c7ddf3a7c87ff25beaa36c1e05f57480a27a52e8a1e155e2909d8b2f44b6331620eaaaea4b6c46dc5afafd0e4a40ef2e7533c56e15b2563369108d45bf68311b6b7e504f5e9ba737df94fc68df696b8dc72fa41eada90884fd1b9d518a490fd508cfb92501c535c09399bf16d756560c32196ef04be0ecece98cdc2bdbc44f53fcc8b548e3c41a3b568efb9ec540a156ac17fbdc92eee5732fea639b37660f8acd3cc830bf1cfbd1f5a7a7e1e5b6d340595b1669cb0694995fe644dc9b8e9a24a8cce99837cc84f584f7ca552d23d403b3225de7843c96e63ca02e3148dbacb9f683f5d3b47ffa3b1d738efa68af1f76c57c52a3cf181d6f1ebac54bbf88a019ea4716bf238f503a634918d44f3485f5c5249123f0b0889a27f23b187e60cf1b1077b4c59126af11", 0x1000) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:42 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) lseek(r3, 0xfffffffffffffffe, 0x1) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) 18:52:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) inotify_init1(0x0) close(r2) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000340)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20ncci\x00', 0x800, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)="44b5313c96d9ab44b57fc00bf295f0782f3b620a4b1741fc401b723fe37e866de7f3d0b258beee52450bd03ab6afcf8d689cf2cd94c11b30e5c5158355c07a902da5d59148724bc48320e2c97fa651fe6a5bd89eac6a2ff88a24c7ea575e5f6a2bb247b00f3b86e73dacb19c12dbdf499abf36", 0x73}, {&(0x7f0000000140)="7088f5f20edaca7270c9331ac2aa38828e4e83299725b0ee4b7ee0c79e6bebf46d7eb4798c59ff7b8da388acd82af6605451eb67723db85f0bac7b9ce6888d013c247550d55c0d413594dbd6f126c61009147af1904d71d1a93af2dee62fe3b1456664442ac09cfdbb517d31fa5bd9987eeff3764cb98535d1ba09f7b64b5e10eb3c1f433f02662be7e3f6d7fadc9a27b1041141699e7b5423afd6234451960dd5f1fb9e2b3e4569fdbf66b7fd8f32c23c1eba37748467d48c538470866aa71c07d64e1e60cfc5fc2d78295ff1586f92b4a8ee3b48e9", 0xd6}, {&(0x7f0000000240)="c786d8dcfb80ff4eab1f57ca1fda5297cd34abded19ba4c82a421ad97b3a00b497cddb113574eb18a8ef8c6a633aafaf256d9e404062fced6275171ade183f1ed70181f5a413d87b8dbea0b6355612a82c24e2f6fa94fc6b75368c3c7467fc065a5a0eda7fa93510565b6e65636f98abedc0a6aa038dd28939f1594a0c0e31a2dcdb9dbbdf348bf3a2a1467eb0ef4d7cc82550e9500fc267fa6f8ddfc099fd33f0c23a863a2f4792cfb46d37cfcf0c70a59f2d7fdd06f5d325bd76a57543b88276299482ab67489ab7559658a5a2fbde5a9d8ab1112804", 0xd7}], 0x3, 0x6) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x1c3) getdents64(r6, 0x0, 0x0) lseek(r6, 0xfffffffffffffffe, 0x1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) lseek(r7, 0xfffffffffffffffe, 0x1) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f00000003c0)={r4, 0xffffffff, 0x4, r7}) [ 418.924153] Unknown ioctl 21513 [ 418.928386] RDS: rds_bind could not find a transport for 172.30.0.1, load rds_tcp or rds_rdma? 18:52:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xfffffffffffffff3) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getpgrp(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) prctl$PR_GET_PDEATHSIG(0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setfsuid(0x0) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) 18:52:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmmsg(r0, &(0x7f0000000100), 0x1e4c39184aa46dc, 0x0) 18:52:42 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000180)='./file0/bus\x00', 0x6210, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7fff, 0x60000) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x5, {0x3, 0x80000001, 0x101, 0x9, 0x10000, 0x3}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./file0/bus\x00', r2, 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40, 0x0) [ 419.126123] audit: type=1400 audit(1570387962.609:219): avc: denied { syslog } for pid=15468 comm="syz-executor.0" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:52:42 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) modify_ldt$write(0x1, &(0x7f0000000680)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7e9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x20000, 0x0) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x8010, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000100)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 18:52:42 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="1500000065ffff0010000008003950323030300900fc9cd866b42938ab01426249b39d9b281a9b3672476a814ac42843aa88e1db60ba47b6bb30407402000000349f062e4624400100000000000000e03a80b9374675d0f7b100237209ffe467ab081296c3c5085a515cf18151210b8615d54f1c7f3e9ef2ec1577c935216a586171a0aca40d531e7d4986fe59ec1406936a1b561565ffefd7652e6c949d9a7f95f42d36d892d4b30cc1fc50434686595553e6f3381cf655df317fe9ca3533e7afb1ced5c006e691b4999cf6c0aae1178e256baacb07e6f80b9f8e6b2dd919e5ec9ec4f3b57d528930399f5c7903c06e4298f2d6774ba4d327c8c4c783340d84b8252dc0961fdc1816a67772058c027c49111761cd867b446e1d09fc35834cb3e8e0ed7bde47964dc091ec1ce2dd7bfa8c430600000000000000ce550d9645db0c58453350fa101f5aae17559fcfd2bd00000000c2621a68a28ccc39235cdf20d22060d3c8f352e341635ee4eeb0aad9d953e0a7dd37de2bfc4fc5d81bfa4264c89a612bf74868309f840cc82f1cb476a4eaa8728c34272f7fe63fe0"], 0x15) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x139, 0xfffffffffffffffe}) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r1, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)=0x800, 0x12) syz_open_dev$char_usb(0xc, 0xb4, 0x9) umount2(&(0x7f0000000140)='./file0\x00', 0xb) getsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 18:52:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x80, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) lseek(r4, 0xfffffffffffffffe, 0x1) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000240)=0x100, 0x4) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000100)={0x20, 0xffffffff80000001}) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f00000001c0)=0x8db0, 0x4) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x60, 0x0, 0xfffffdb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000)={0x8, 0x3128179ff3acc699, 0x40, 0x7, 0x7}, 0xc) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, 0x0, 0x0) lseek(r5, 0xfffffffffffffffe, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000040)={0x5, 0x2, 0x5000, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000080)={0x2, 0x1b9, 0x4, 0xfff, 0x0, 0x100}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:52:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xfffffffffffffff3) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getpgrp(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) prctl$PR_GET_PDEATHSIG(0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setfsuid(0x0) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) [ 419.398347] Unknown ioctl 21532 [ 419.573231] list_add double add: new=ffff888052a49c18, prev=ffff888052a49c18, next=ffff888093fab540. [ 419.583314] ------------[ cut here ]------------ [ 419.588191] kernel BUG at lib/list_debug.c:29! [ 419.592890] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 419.598252] Modules linked in: [ 419.601454] CPU: 1 PID: 15498 Comm: syz-executor.3 Not tainted 4.14.147 #0 [ 419.608461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.617811] task: ffff888082610640 task.stack: ffff88808ff38000 [ 419.618913] kobject: 'loop2' (ffff8880a4a3a9a0): kobject_uevent_env [ 419.623874] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 419.623879] RSP: 0018:ffff88808ff3fa00 EFLAGS: 00010282 [ 419.623887] RAX: 0000000000000058 RBX: ffff888093fab500 RCX: 0000000000000000 [ 419.623892] RDX: 00000000000100aa RSI: ffffffff814b4025 RDI: ffffed1011fe7f36 [ 419.623898] RBP: ffff88808ff3fa18 R08: 0000000000000058 R09: ffff888082610f08 [ 419.623904] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888093fab540 [ 419.623912] R13: ffff888052a49c18 R14: ffff888052a49c18 R15: ffff888052a49c18 [ 419.639178] kobject: 'loop2' (ffff8880a4a3a9a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 419.640831] FS: 00007fb02b717700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 419.640837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 419.640842] CR2: 000000c41ed5f000 CR3: 00000000a51fe000 CR4: 00000000001406e0 [ 419.640850] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 419.640856] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 419.640860] Call Trace: [ 419.640873] ? _raw_spin_lock+0x37/0x40 [ 419.640886] p9_fd_request+0xe3/0x2b0 [ 419.673384] Unknown ioctl 21532 [ 419.677204] p9_client_rpc+0x21b/0x1180 [ 419.677220] ? p9_client_prepare_req.part.0+0xa90/0xa90 [ 419.677231] ? trace_hardirqs_on_caller+0x400/0x590 [ 419.677239] ? trace_hardirqs_on+0xd/0x10 [ 419.677254] ? finish_wait+0x260/0x260 [ 419.677263] ? destroy_inode+0xc7/0x120 [ 419.677272] ? evict+0x3e6/0x630 [ 419.677284] p9_client_clunk+0x89/0x150 [ 419.677296] v9fs_dentry_release+0x6d/0xd0 [ 419.677305] ? v9fs_cached_dentry_delete+0x40/0x40 [ 419.677320] __dentry_kill+0x39a/0x580 [ 419.716395] kobject: 'loop1' (ffff8880a4a04920): kobject_uevent_env [ 419.722904] ? dput.part.0+0x2a/0x750 [ 419.722915] ? dput.part.0+0x2a/0x750 [ 419.722923] dput.part.0+0x59f/0x750 [ 419.722934] do_one_tree+0x44/0x50 [ 419.722945] shrink_dcache_for_umount+0x67/0x140 [ 419.730389] kobject: 'loop1' (ffff8880a4a04920): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 419.733287] generic_shutdown_super+0x6d/0x370 [ 419.733297] kill_anon_super+0x3f/0x60 [ 419.733309] v9fs_kill_super+0x3e/0xa0 [ 419.733319] deactivate_locked_super+0x74/0xe0 [ 419.733328] deactivate_super+0x85/0xa0 [ 419.733340] cleanup_mnt+0xb2/0x150 [ 419.733349] __cleanup_mnt+0x16/0x20 [ 419.733359] task_work_run+0x114/0x190 [ 419.733374] exit_to_usermode_loop+0x1da/0x220 [ 419.856192] do_syscall_64+0x4bc/0x640 [ 419.860071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.864900] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 419.870072] RIP: 0033:0x459a59 [ 419.873288] RSP: 002b:00007fb02b716c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 419.880978] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000459a59 [ 419.888239] RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000020000140 [ 419.895574] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 419.902847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb02b7176d4 [ 419.910255] R13: 00000000004c9494 R14: 00000000004e0b60 R15: 00000000ffffffff [ 419.917638] Code: e9 56 ff ff ff 4c 89 e1 48 c7 c7 00 31 9d 86 e8 1f 9f 72 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 40 32 9d 86 e8 08 9f 72 fe <0f> 0b 48 89 f1 48 c7 c7 c0 31 9d 86 4c 89 e6 e8 f4 9e 72 fe 0f [ 419.936795] RIP: __list_add_valid.cold+0x26/0x3c RSP: ffff88808ff3fa00 [ 419.943678] ---[ end trace 5ea44a44a29e78c9 ]--- [ 419.948437] Kernel panic - not syncing: Fatal exception [ 419.955382] Kernel Offset: disabled [ 419.959005] Rebooting in 86400 seconds..